14 protocol-based vlan mambership, 7 spanning tree protocol, 1 theory – Interlogix NS3550-8T-2S User Manual User Manual
Page 121
![background image](/manuals/679214/121/background.png)
121
4.6.14 Protocol-based VLAN Mambership
This page allows you to map an already configured Group Name to a VLAN for the switch. The Group Name to VLAN Mapping
Table screen in
Figure 4-6-21
appears.
Figure 4-6-21:
Group Name to VLAN Mapping Table Page Screenshot
The page includes the following fields:
Object
Description
Delete
To delete a Group Name to VLAN map entry, check this box. The entry will be
deleted on the switch during the next Save
Group Name
A valid Group Name is a string of atmost 16 characters which consists of a
combination of alphabets (a-z or A-Z) and integers(0-9), no special character is
allowed. Whichever Group name you try mapping to a VLAN must be present in
Protocol to Group mapping table and must not be preused by any other existing
mapping entry on this page.
VLAN ID
Indicates the ID to which Group Name will be mapped. A valid VLAN ID ranges
from 1-4095.
Port Members
A row of check boxes for each port is displayed for each Group Name to VLAN ID
mapping. To include a port in a mapping, check the box. To remove or exclude
the port from the mapping, make sure the box is unchecked. By default, no ports
are members, and all boxes are unchecked.
Buttons
: Click to add a new entry in mapping table.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Auto-refresh
: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
: Click to refresh the page immediately.
4.7 Spanning Tree Protocol
4.7.1 Theory
The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches,
bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route
exists between any two stations on the network, and provide backup links which automatically take over when a primary link
goes down. The spanning tree algorithms supported by this switch include these versions:
STP – Spanning Tree Protocol (IEEE 802.1D)
RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w)
MSTP – Multiple Spanning Tree Protocol (IEEE 802.1s)
The IEEE 802.1D Spanning Tree Protocol and IEEE 802.1w Rapid Spanning Tree Protocol allow for the blocking of links
between switches that form loops within the network. When multiple links between switches are detected, a primary link is
established. Duplicated links are blocked from use and become standby links. The protocol allows for the duplicated links to be
used in the event of a failure of the primary link. Once the Spanning Tree Protocol is configured and enabled, primary links are