Enterasys Networks 2200 User Manual
Page 12
x
Contents
Defining a VLAN ........................................................................... 12-7
Classifying Frames to a VLAN ...................................................... 12-7
Customizing the VLAN Forwarding List ........................................ 12-7
VLAN Switch Operation ................................................................................ 12-8
12.7.1
Receiving Frames from VLAN Ports ............................................. 12-9
Forwarding Decisions ................................................................... 12-9
12.7.2.1 Broadcasts, Multicasts, and Unknown Unicasts............ 12-9
12.7.2.2 Known Unicasts........................................................... 12-10
Managing the Switch................................................................... 12-10
Switch Without VLANs ................................................................ 12-11
Switch with VLANs...................................................................... 12-11
Summary of VLAN Local Management....................................................... 12-14
12.9.1
Preparing for VLAN Configuration .............................................. 12-14
Example 1, Single Switch Operation........................................................... 12-21
12.12.1
Solving the Problem.................................................................... 12-22
Frame Handling .......................................................................... 12-23
Example 2, VLANs Across Multiple Switches ............................................. 12-24
12.13.1
Solving the Problem.................................................................... 12-26
Frame Handling .......................................................................... 12-28
Example 3, 1D Trunk Connection to 802.1Q VLAN Network...................... 12-31
12.14.1
Solving the Problem.................................................................... 12-33
Frame Handling .......................................................................... 12-34
Example 4, Isolating Network Traffic According to Protocol ....................... 12-37
12.15.1
Solving the Problem.................................................................... 12-39
Example 5, Filtering Traffic According to a Layer 4 Classification Rule ...... 12-42
12.16.1
Solving the Problem.................................................................... 12-42
Example 6, Securing Sensitive Information According to Subnet ............... 12-43
12.17.1
Solving the Problem.................................................................... 12-44
Example 7, Using Dynamic Egress to Control Traffic ................................. 12-44
Example 8, Locking a MAC Address to a Port Using Classification Rules . 12-46
12.19.1
Solving the Problem.................................................................... 12-47