C
HAPTER
6
| VLAN Configuration
IEEE 802.1Q VLANs
– 199 –
VLAN Classification
– When the switch receives a frame, it classifies the
frame in one of two ways. If the frame is untagged, the switch assigns the
frame to an associated VLAN (based on the default VLAN ID of the
receiving port). But if the frame is tagged, the switch uses the tagged
VLAN ID to identify the port broadcast domain of the frame.
Port Overlapping
– Port overlapping can be used to allow access to
commonly shared network resources among different VLAN groups, such
as file servers or printers. Note that if you implement VLANs which do not
overlap, but still need to communicate, you can connect them by enabled
routing on this switch.
Untagged VLANs
– Untagged VLANs are typically used to reduce
broadcast traffic and to increase security. A group of network users
assigned to a VLAN form a broadcast domain that is separate from other
VLANs configured on the switch. Packets are forwarded only between ports
that are designated for the same VLAN. Untagged VLANs can be used to
manually isolate user groups or subnets. However, you should use IEEE
802.3 tagged VLANs with GVRP whenever possible to fully automate VLAN
registration.
Automatic VLAN Registration
– GVRP (GARP VLAN Registration
Protocol) defines a system whereby the switch can automatically learn the
VLANs to which each end station should be assigned. If an end station (or
its network adapter) supports the IEEE 802.1Q VLAN protocol, it can be
configured to broadcast a message to your network indicating the VLAN
groups it wants to join. When this switch receives these messages, it will
automatically place the receiving port in the specified VLANs, and then
forward the message to all other ports. When the message arrives at
another switch that supports GVRP, it will also place the receiving port in
the specified VLANs, and pass the message on to all other ports. VLAN
requirements are propagated in this way throughout the network. This
allows GVRP-compliant devices to be automatically configured for VLAN
groups based solely on end station requests.
To implement GVRP in a network, first add the host devices to the required
VLANs (using the operating system or other application software), so that
these VLANs can be propagated onto the network. For both the edge
switches attached directly to these hosts, and core switches in the
network, enable GVRP on the links between these devices. You should also
determine security boundaries in the network and disable GVRP on the
boundary ports to prevent advertisements from being propagated, or
forbid those ports from joining restricted VLANs.
N
OTE
:
If you have host devices that do not support GVRP, you should
configure static or untagged VLANs for the switch ports connected to these
devices (as described in
"Adding Static Members to VLANs" on page 202
).
But you can still enable GVRP on these edge switches, as well as on the
core switches in the network.
Содержание ECS3510-10PD
Страница 1: ...Management Guide www edge core com 10 Port Layer 2 Fast Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 48: ...CONTENTS 48...
Страница 68: ...SECTION I Getting Started 68...
Страница 78: ...CHAPTER 1 Introduction System Defaults 78...
Страница 96: ...CHAPTER 2 Initial Switch Configuration Managing System Files 96...
Страница 98: ...SECTION II Web Configuration 98...
Страница 118: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 118...
Страница 150: ...CHAPTER 4 Basic Management Tasks Resetting the System 150...
Страница 196: ...CHAPTER 5 Interface Configuration VLAN Trunking 196 Figure 66 Configuring VLAN Trunking...
Страница 238: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 238...
Страница 264: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 264...
Страница 274: ...CHAPTER 9 Congestion Control Automatic Traffic Control 274...
Страница 288: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 288...
Страница 304: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 304...
Страница 423: ...CHAPTER 13 Security Measures DHCP Snooping 423 Figure 229 Displaying the Binding Table for DHCP Snooping...
Страница 424: ...CHAPTER 13 Security Measures DHCP Snooping 424...
Страница 568: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 568...
Страница 596: ...CHAPTER 15 IP Configuration Setting the Switch s IP Address IP Version 6 596...
Страница 614: ...CHAPTER 1 IP Services Configuring the PPPoE Intermediate Agent 614...
Страница 784: ...CHAPTER 20 System Management Commands Powered Device 784...
Страница 814: ...CHAPTER 22 Remote Monitoring Commands 814...
Страница 1008: ...CHAPTER 26 Interface Commands Power Savings 1008...
Страница 1022: ...CHAPTER 27 Link Aggregation Commands Trunk Status Display Commands 1022...
Страница 1052: ...CHAPTER 29 Congestion Control Commands Automatic Traffic Control Commands 1052...
Страница 1064: ...CHAPTER 31 UniDirectional Link Detection Commands 1064...
Страница 1070: ...CHAPTER 32 Address Table Commands 1070...
Страница 1130: ...CHAPTER 34 ERPS Commands 1130...
Страница 1172: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 1172...
Страница 1186: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 1186...
Страница 1302: ...CHAPTER 38 Multicast Filtering Commands MVR for IPv6 1302...
Страница 1368: ...CHAPTER 40 CFM Commands Delay Measure Operations 1368...
Страница 1390: ...CHAPTER 42 Domain Name Service Commands 1390...
Страница 1448: ...CHAPTER 44 IP Interface Commands ND Snooping 1448...
Страница 1450: ...SECTION IV Appendices 1450...
Страница 1455: ...APPENDIX A Software Specifications Management Information Bases 1455 UDP MIB RFC 2013...
Страница 1456: ...APPENDIX A Software Specifications Management Information Bases 1456...
Страница 1464: ...APPENDIX D Compliances and Safety Statements CE Mark Declaration of Conformance for EMI and Safety EEC 1464...
Страница 1482: ...COMMAND LIST 1482...
Страница 1493: ......
Страница 1494: ...ECS3510 10PD E032014 ST R03 149100000179A...