Web Management Guide-R01
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA (Authentication, Authorization and Accounting)
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCP Snooping
- DHCPv6 Snooping
- ND Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- Ethernet Ring Protection Switching
- OAM Configuration
- UDLD Configuration
- LBD Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Packets on an Interface
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Configuring MLD Snooping and Query Parameters
- Setting Immediate Leave Status for MLD Snooping per Interface
- Specifying Static Interfaces for an IPv6 Multicast Router
- Assigning Interfaces to IPv6 Multicast Services
- Filtering MLD Query Packets on an Interface
- Showing MLD Snooping Groups and Source List
- Displaying MLD Snooping Statistics
- Filtering and Throttling MLD Groups
- Multicast VLAN Registration for IPv4
- IP Tools
- IP Configuration
- General IP Routing
- IP Services
- Appendices
Chapter 5
| VLAN Configuration
IEEE 802.1Q VLANs
– 158 –
disable GVRP on the boundary ports to prevent advertisements from being
propagated, or forbid those ports from joining restricted VLANs.
Note:
If you have host devices that do not support GVRP, you should configure
static or untagged VLANs for the switch ports connected to these devices (as
described in “Adding Static Members to VLANs” on page 161). But you can still
enable GVRP on these edge switches, as well as on the core switches in the
network.
Figure 77: Using GVRP
Forwarding Tagged/Untagged Frames
If you want to create a small port-based VLAN for devices attached directly to a
single switch, you can assign ports to the same untagged VLAN. However, to
participate in a VLAN group that crosses several switches, you should create a VLAN
for that group and enable tagging on all ports.
Ports can be assigned to multiple tagged or untagged VLANs. Each port on the
switch is therefore capable of passing tagged or untagged frames. When
forwarding a frame from this switch along a path that contains any VLAN-aware
devices, the switch should include VLAN tags. When forwarding a frame from this
switch along a path that does not contain any VLAN-aware devices (including the
destination host), the switch must first strip off the VLAN tag before forwarding the
frame. When the switch receives a tagged frame, it will pass this frame onto the
VLAN(s) indicated by the frame tag. However, when this switch receives an
untagged frame from a VLAN-unaware device, it first decides where to forward the
frame, and then inserts a VLAN tag reflecting the ingress port’s default VID.
Port-based VLAN
1
2
9 3 4
10 11
12
13
14
5 6 7 8
15 16
18
19