Tp-Link TL-SL3428 [60/234] Q vlan
![Tp-Link TL-SL3428 [60/234] Q vlan](/views2/1042103/page60/bg3c.png)
VLANs.
The switch can analyze the received untagged packets on the port and match the packets
with the Protocol VLAN and 802.1Q VLAN in turn. If a packet is matched, the switch will add a
corresponding VLAN tag to it and forward it in the corresponding VLAN.
6.1 802.1Q VLAN
VLAN tags in the packets are necessary for the switch to identify packets of different VLANs. The
switch works at the data link layer in OSI model and it can identify the data link layer encapsulation
of the packet only, so you can add the VLAN tag field into the data link layer encapsulation for
identification.
In 1999, IEEE issues the IEEE 802.1Q protocol to standardize VLAN implementation, defining the
structure of VLAN-tagged packets. IEEE 802.1Q protocol defines that a 4-byte VLAN tag is
encapsulated after the destination MAC address and source MAC address to show the information
about VLAN.
As shown in the following figure, a VLAN tag contains four fields, including TPID (Tag Protocol
Identifier), Priority, CFI (Canonical Format Indicator), and VLAN ID.
Figure 6-2 Format of VLAN Tag
(1) TPID: TPID is a 16-bit field, indicating that this data frame is VLAN-tagged. By default, it is
0x8100.
(2) Priority: Priority is a 3-bit field, referring to 802.1p priority. Refer to section “QoS & QoS
profile” for details.
(3) CFI: CFI is a 1-bit field, indicating whether the MAC address is encapsulated in the
standard format in different transmission media. This field is not described in detail in this
chapter.
(4) VLAN ID: VLAN ID is a 12-bit field, indicating the ID of the VLAN to which this packet
belongs. It is in the range of 0 to 4,095. Generally, 0 and 4,095 is not used, so the field is in
the range of 1 to 4,094.
VLAN ID identifies the VLAN to which a packet belongs. When the switch receives an
un-VLAN-tagged packet, it will encapsulate a VLAN tag with the default VLAN ID of the inbound
port for the packet, and the packet will be assigned to the default VLAN of the inbound port for
transmission.
In this User Guide, the tagged packet refers to the packet with VLAN tag whereas the untagged
packet refers to the packet without VLAN tag, and the priority-tagged packet refers to the packet
with VLAN tag whose VLAN ID is 0.
Link Types of ports
When creating the 802.1Q VLAN, you should set the link type for the port according to its
connected device. The link types of port including the following three types:
(1) ACCESS: The ACCESS port can be added in a single VLAN, and the egress rule of the
port is UNTAG. The PVID is same as the current VLAN ID. If the ACCESS port is added to
another VLAN, it will be removed from the current VLAN automatically.
53
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety notices 2
- Package contents 8
- Chapter 1 about this guide 9
- Conventions 9
- Intended readers 9
- Overview of this guide 9
- Chapter 2 introduction 13
- Main features 13
- Overview of the switch 13
- Appearance description 14
- Front panel 14
- Rear panel 15
- Chapter 3 login to the switch 16
- Configuration 16
- Chapter 4 system 18
- System info 18
- System summary 18
- Device description 20
- The following entries are displayed on this screen 20
- System time 21
- The following entries are displayed on this screen 21
- System ip 22
- The following entries are displayed on this screen 22
- User manage 23
- User table 23
- The following entries are displayed on this screen 24
- User config 24
- Config restore 25
- System tools 25
- The following entries are displayed on this screen 25
- Config backup 26
- Firmware upgrade 26
- The following entries are displayed on this screen 26
- System reboot 27
- System reset 27
- Access control 28
- Access security 28
- The following entries are displayed on this screen 29
- Ssl config 30
- Ssh config 31
- The following entries are displayed on this screen 31
- The following entries are displayed on this screen 32
- Application example 1 for ssh 33
- Application example 2 for ssh 34
- Chapter 5 switching 37
- Port config 37
- Port mirror 38
- Port security 41
- Port isolation 43
- Lag table 44
- Static lag 46
- Lacp config 47
- Traffic monitor 49
- Traffic summary 49
- Traffic statistics 50
- Mac address 51
- Address table 52
- Static address 54
- Dynamic address 55
- Filtering address 57
- Chapter 6 vlan 59
- Q vlan 60
- Vlan config 62
- Port config 64
- Configuration procedure 65
- Protocol vlan 66
- Protocol template 67
- Protocol vlan 67
- Port enable 68
- Application example for 802 q vlan 69
- Configuration procedure 69
- Application example for protocol vlan 71
- Configuration procedure 75
- Chapter 7 spanning tree 76
- Stp config 81
- The following entries are displayed on this screen 82
- Stp summary 83
- Port config 84
- The following entries are displayed on this screen 85
- Mstp instance 86
- Region config 86
- Instance config 87
- The following entries are displayed on this screen 87
- Instance port config 88
- The following entries are displayed on this screen 88
- The following entries are displayed on this screen 89
- Global configuration procedure for spanning tree function 90
- Port protect 90
- Stp security 90
- The following entries are displayed on this screen 92
- Tc protect 93
- The following entries are displayed on this screen 93
- Application example for stp function 94
- Chapter 8 multicast 98
- Igmp snooping 100
- Snooping config 101
- Port config 102
- The following entries are displayed on this screen 102
- The following entries are displayed on this screen 103
- Vlan config 103
- The following entries are displayed on this screen 104
- Configuration procedure 105
- Multicast vlan 105
- The following entries are displayed on this screen 106
- Application example for multicast vlan 107
- Configuration procedure 107
- Multicast ip 108
- Multicast ip table 109
- Static multicast ip 109
- The following entries are displayed on this screen 109
- The following entries are displayed on this screen 110
- Ip range 111
- Multicast filter 111
- The following entries are displayed on this screen 111
- Port filter 112
- The following entries are displayed on this screen 112
- Configuration procedure 113
- Packet statistics 113
- The following entries are displayed on this screen 113
- Chapter 9 qos 115
- Diffserv 118
- Port priority 118
- The following entries are displayed on this screen 118
- Configuration procedure 119
- Schedule mode 119
- The following entries are displayed on this screen 119
- P priority 120
- The following entries are displayed on this screen 120
- Configuration procedure 121
- Dscp priority 121
- Configuration procedure 122
- The following entries are displayed on this screen 122
- Bandwidth control 123
- Rate limit 123
- The following entries are displayed on this screen 123
- Storm control 124
- The following entries are displayed on this screen 125
- Voice vlan 125
- Global config 127
- Port config 128
- The following entries are displayed on this screen 128
- Oui config 129
- The following entries are displayed on this screen 129
- Configuration procedure of voice vlan 130
- The following entries are displayed on this screen 130
- Chapter 10 acl 131
- The following entries are displayed on this screen 131
- Time range 131
- Time range summary 131
- The following entries are displayed on this screen 132
- Time range create 132
- Acl config 133
- Holiday config 133
- The following entries are displayed on this screen 133
- Acl create 134
- Acl summary 134
- The following entries are displayed on this screen 134
- Mac acl 135
- The following entries are displayed on this screen 135
- Standard ip acl 136
- The following entries are displayed on this screen 136
- Extend ip acl 137
- The following entries are displayed on this screen 137
- Policy config 138
- Policy summary 138
- The following entries are displayed on this screen 138
- Action create 139
- Ies are displayed on this screen 139
- Policy create 139
- The following entr 139
- Binding table 140
- Policy binding 140
- The following entries are displayed on this screen 140
- Are displayed on this screen 141
- Port binding 141
- The following entries 141
- Vlan binding 141
- Application example for acl 142
- Configuration procedure 142
- The following entries are displayed on this screen 142
- Binding table 145
- Chapter 11 network security 145
- Ip mac binding 145
- Manual binding 146
- Arp scanning 148
- Dhcp snooping 149
- Arp inspection 155
- Arp detect 159
- Arp defend 160
- Configuration procedure 160
- Arp statistics 161
- Dos defend 162
- Choose the menu network security dos defend dos defend to load the following page 163
- Config 163
- Dos attack type description 163
- Figure 11 16 dos defend 163
- On this page you can enable the dos defend type appropriate to your need 163
- Table 11 1 defendable dos attack types 163
- The following entries are displayed on this screen 163
- Global config 168
- Port config 169
- Radius server 171
- Configuration procedure 172
- Chapter 12 snmp 173
- Global config 175
- Snmp config 175
- Snmp view 176
- Snmp group 177
- Snmp user 178
- Snmp community 180
- Configuration procedure 181
- Notification 182
- Event config 185
- History control 185
- Alarm config 186
- Chapter 13 cluster 189
- Neighbor info 190
- Ndp summary 191
- The following entries are displayed on this screen 191
- The following entries are displayed on this screen 192
- Ndp config 193
- The following entries are displayed on this screen 193
- Device table 194
- The following entries are displayed on this screen 194
- Ntdp summary 195
- The following entries are displayed on this screen 196
- Ntdp config 197
- The following entries are displayed on this screen 197
- Cluster 198
- Cluster summary 198
- The following entries are displayed on this screen 198
- The following entries are displayed on this screen 199
- Cluster config 200
- The following entries are displayed on this screen 200
- Application example for cluster function 201
- The following entries are displayed on this screen 201
- Chapter 14 maintenance 204
- Cpu monitor 204
- System monitor 204
- Memory monitor 205
- Log table 207
- Local log 208
- Remote log 208
- Backup log 209
- Cable test 210
- Device diagnose 210
- Loopback 211
- Network diagnose 212
- Tracert 213
- Chapter 15 system maintenance via ftp 214
- Configure the hyper terminal 214
- Hardware installation 214
- Download firmware via booutil menu 216
- Appendix a specifications 219
- Appendix b configuring the pcs 220
- Appendix c 802 x client software 223
- Installation guide 223
- Uninstall software 226
- Configuration 227
- Appendix d glossary 231
Похожие устройства
- Toshiba GR-H64RD Инструкция по эксплуатации
- Sony CDX-GT454US Инструкция по эксплуатации
- Sony HDR-CX6EK Инструкция по эксплуатации
- Tp-Link TL-SG2424 Инструкция по эксплуатации
- Sony CDX-GT457UE Инструкция по эксплуатации
- Sony HDR-CX690E Инструкция по эксплуатации
- Tp-Link TL-SG2216 Инструкция по эксплуатации
- Beko CE 58100 Инструкция по эксплуатации
- Sony CDX-GT650UI Инструкция по эксплуатации
- Sony HDR-CX560VE Инструкция по эксплуатации
- Tp-Link TL-SL2210WEB Инструкция по эксплуатации
- Panasonic TC-14SV2 Инструкция по эксплуатации
- Sony CDX-GT747 UI Инструкция по эксплуатации
- Sony HDR-CX560E Инструкция по эксплуатации
- Tp-Link TL-SL2218WEB Инструкция по эксплуатации
- Panasonic KX-FPC96 Инструкция по эксплуатации
- Sony DSX-S100 Инструкция по эксплуатации
- Sony HDR-CX550VE Инструкция по эксплуатации
- Tp-Link TL-SL2428WEB Инструкция по эксплуатации
- Sony XSGTX121LC Инструкция по эксплуатации