Enterasys Networks 6H2xx User Manual
Page 13

Contents
xi
Defining a VLAN ........................................................................... 13-8
Classifying Frames to a VLAN ...................................................... 13-8
Customizing the VLAN Forwarding List ........................................ 13-8
VLAN Switch Operation ................................................................................ 13-9
13.7.1
Receiving Frames from VLAN Ports ........................................... 13-10
Forwarding Decisions ................................................................. 13-10
13.7.2.1 Broadcasts, Multicasts, and Unknown Unicasts.......... 13-10
13.7.2.2 Known Unicasts........................................................... 13-11
Managing the Switch................................................................... 13-11
Switch Without VLANs ................................................................ 13-11
Switch with VLANs...................................................................... 13-12
Summary of VLAN Local Management....................................................... 13-14
13.9.1
Preparing for VLAN Configuration .............................................. 13-15
Solving the Problem.................................................................... 13-22
Frame Handling .......................................................................... 13-24
Example 2, VLANs Across Multiple Switches ............................................. 13-24
13.13.1
Solving the Problem.................................................................... 13-26
Frame Handling .......................................................................... 13-29
Example 3, Filtering Traffic According to a Layer 4 Classification Rule...... 13-32
13.14.1
Solving the Problem.................................................................... 13-32
Example 4, Securing Sensitive Information According to Subnet ............... 13-33
13.15.1
Solving the Problem.................................................................... 13-34
Example 5, Using Dynamic Egress to Control Traffic ................................. 13-34
Example 6, Locking a MAC Address to a Port Using Classification Rules . 13-36
13.17.1
Solving the Problem.................................................................... 13-36
GENERIC ATTRIBUTE REGISTRATION PROTOCOL (GARP)
Supported Features and Functions.................................................................B-2