User`s guide
Table Of Contents
- Title
- Notice
- Contents
- Figures
- Tables
- About This Guide
- Introduction
- Local Management Requirements
- Accessing Local Management
- 3.1 Navigating Local Management Screens
- 3.2 Password Screen
- 3.3 Main Menu Screen
- 3.4 Module Selection Screen
- 3.5 Module Menu Screen
- 3.6 Overview of Security Methods
- 3.7 Security Menu Screen
- 3.8 Passwords Screen
- 3.9 Radius Configuration Screen
- 3.10 Name Services Configuration Screen
- 3.11 System Authentication Configuration Screen
- 3.12 EAP (Port) Configuration Screen
- 3.13 EAP Statistics Menu Screen
- 3.14 MAC Port Configuration Screen
- 3.15 MAC Supplicant Configuration Screen
- Chassis Menu Screens
- 4.1 Chassis Menu Screen
- 4.2 Chassis Configuration Screen
- 4.3 SNMP Configuration Menu Screen
- 4.4 SNMP Community Names Configuration Screen
- 4.5 SNMP Traps Configuration Screen
- 4.6 Chassis Environmental Information Screen
- 4.7 Redirect Configuration Menu Screen (Chassis)
- 4.8 Port Redirect Configuration Screen
- 4.9 VLAN Redirect Configuration Screen
- Module Configuration Menu Screens
- 5.1 Module Configuration Menu Screen
- 5.2 General Configuration Screen
- 5.2.1 Setting the IP Address
- 5.2.2 Setting the Subnet Mask
- 5.2.3 Setting the Default Gateway
- 5.2.4 Setting the TFTP Gateway IP Address
- 5.2.5 Setting the Module Name
- 5.2.6 Setting the Module Date
- 5.2.7 Setting the Module Time
- 5.2.8 Entering a New Screen Refresh Time
- 5.2.9 Setting the Screen Lockout Time
- 5.2.10 Configuring the COM Port
- 5.2.11 Clearing NVRAM
- 5.2.12 Enabling/Disabling IP Fragmentation
- 5.3 SNMP Configuration Menu Screen
- 5.4 SNMP Community Names Configuration Screen
- 5.5 SNMP Traps Configuration Screen
- 5.6 Access Control List Screen
- 5.7 System Resources Information Screen
- 5.8 FLASH Download Configuration Screen
- Port Configuration Menu Screens
- 6.1 Port Configuration Menu Screen
- 6.2 Ethernet Interface Configuration Screen
- 6.3 Ethernet Port Configuration Screen
- 6.4 HSIM/VHSIM Configuration Screen
- 6.5 Redirect Configuration Menu Screen
- 6.6 Port Redirect Configuration Screen
- 6.7 VLAN Redirect Configuration Screen
- 6.8 Link Aggregation Screen (802.3ad Main Menu Screen)
- 6.9 Broadcast Suppression Configuration Screen
- 802.1 Configuration Menu Screens
- 802.1Q VLAN Configuration Menu Screens
- 8.1 Summary of VLAN Local Management
- 8.2 802.1Q VLAN Configuration Menu Screen
- 8.3 Static VLAN Configuration Screen
- 8.4 Static VLAN Egress Configuration Screen
- 8.5 Current VLAN Configuration Screen
- 8.6 Current VLAN Egress Configuration Screen
- 8.7 VLAN Port Configuration Screen
- 8.8 VLAN Classification Configuration Screen
- 8.9 Protocol Port Configuration Screen
- 802.1p Configuration Menu Screens
- 9.1 802.1p Configuration Menu Screen
- 9.2 Port Priority Configuration Screen
- 9.3 Traffic Class Information Screen
- 9.4 Traffic Class Configuration Screen
- 9.5 Transmit Queues Configuration Screen
- 9.6 Priority Classification Configuration Screen
- 9.7 Protocol Port Configuration Screen
- 9.8 Rate Limiting Configuration Screen
- Layer 3 Extensions Menu Screens
- Module Statistics Menu Screens
- Network Tools Screens
- VLAN Operation and Network Applications
- 13.1 Defining VLANs
- 13.2 Types of VLANs
- 13.3 Benefits and Restrictions
- 13.4 VLAN Terms
- 13.5 VLAN Operation
- 13.6 Configuration Process
- 13.7 VLAN Switch Operation
- 13.8 VLAN Configuration
- 13.9 Summary of VLAN Local Management
- 13.10 Quick VLAN Walkthrough
- 13.11 Examples
- 13.12 Example 1, Single Switch Operation
- 13.13 Example 2, VLANs Across Multiple Switches
- 13.14 Example 3, Filtering Traffic According to a Layer 4 Classification Rule
- 13.15 Example 4, Securing Sensitive Information According to Subnet
- 13.16 Example 5, Using Dynamic Egress to Control Traffic
- 13.17 Example 6, Locking a MAC Address to a Port Using Classification Rules
- Generic Attribute Registration Protocol (GARP)
- About IGMP
- Index

Example 2, VLANs Across Multiple Switches
13-24 VLAN Operation and Network Applications
13.12.2 Frame Handling
This section describes the operations of the switch when two frames are received. The first frame
is a broadcast sent by station R1.
1. Station R1 transmits the broadcast frame. The switch receives this frame on Port 1. As the frame
is received, the switch classifies it. The frame is untagged, so the switch classifies it as belonging
to the VLAN that Port 1 is assigned to, the Red VLAN.
2. At the same time, the switch adds the source MAC address of the frame and the VLAN
associated with port 1 to its Source Address Table in FDB ID 2. In this fashion it learns that
station R1 is located out Port 1.
3. Once the frame is classified, its destination MAC address is examined. The switch discovers that
the frame is a broadcast, and treats it as it would any other unknown destination MAC address.
The switch forwards the frame out all ports in the Red VLAN’s Forwarding List except for the
one that received the frame. In this case, the frame is sent to Ports 2 and 3.
The second frame is a unicast, where station R2 responds to station R1’s broadcast.
4. Station R2, having received and recognized the broadcast from R1, transmits a unicast frame as
a response. The switch receives this frame on Port 2. The switch classifies this new untagged
frame as belonging to the Red VLAN.
5. The switch adds the source MAC address and VLAN for station R2 to its Source Address Table
in FDB ID 2, and checks the Source Address Table for the destination MAC address given in
the frame. The switch finds the MAC address and VLAN in this table, and recognizes that the
MAC address and VLAN match for R1 is located out Port 1.
6. The switch examines its VLAN configuration information and determines that the frame for Red
VLAN is allowed to be forwarded out Port 1 and that it must be sent in an untagged format.
7. The switch forwards the frame out Port 1. Any other unicast transmissions between stations R1
and R2 will be handled identically.
13.13 EXAMPLE 2, VLANs ACROSS MULTIPLE SWITCHES
This second example investigates the steps that must be taken to set up VLANs across multiple
802.1Q VLAN switches. This includes the configuration and operation of trunk ports (port set for
TAGGED frames only) between 802.1Q VLAN switches.
As shown in Figure 13-12, two companies, “Redco” and “Blue Industries,” share floors 2 and 4 in
a building where the network infrastructure is supplied by the building owner. The objective is to
completely isolate the network traffic of the two companies by limiting the user’s traffic through
the ports of two switches, thus maintaining security and shielding the network traffic from each
company. This example will show the use and configuration of a trunk connection and the creation
of VLANs across multiple switches.