Tp-Link T2500-28TC V2 [102/342] Configuration procedure of vlan mapping function
![Tp-Link T2500-28TC V2 [102/342] Configuration procedure of vlan mapping function](/views2/1471213/page102/bg66.png)
91
Select your desired port for VLAN Mapping function. All the ports are disabled for VLAN
Mapping function by default.
Configuration Procedure of VLAN VPN Function:
Step
Operation
Description
1
Enable VPN mode. Required. On the VLAN→VLAN VPN→VPN Config page,
enable the VPN mode.
2
Configure the global TPID. Optional. On the VLAN→VLAN VPN→VPN Config page,
configure the global TPID basing on the devices
connected to the up-link port.
3
Set the VPN up-link port. Required. On the VLAN→VLAN VPN→VPN Config page,
specify the desired port to be the VPN up-link port. It’s
required to set the port connected to the backbone
networks to be up-link port.
4
Create VLAN Mapping
entries.
Required. On the VLAN→VLAN VPN→VL
AN Mapping
page, configure the VLAN Mapping entries basing on the
actual application.
5
Create SP (Service
Provider) VLAN.
Optional. On the VLAN→802.1Q VLAN page, create the
SP VLAN. For the steps of creating VLAN, please refer to
802.1Q VLAN.
Configuration Procedure of VLAN Mapping Function:
Step
Operation
Description
1
Create VLAN Mapping
entries.
Required. On the VLAN→VLAN VPN→
VLAN Mapping
page, configure the VLAN Mapping entries basing on the
actual application.
2
Enab
le VLAN Mapping
function for port.
Required. On the VLAN→VLAN VPN→Port Enable page,
enable VLAN Mapping function for the ports.
3
Create SP (Service
Provider) VLAN
Optional. On the VLAN→802.1Q VLAN page, create the
SP VLAN. For the steps of creating VLAN, please refer to
802.1Q VLAN.
6.8 Private VLAN
Private VLANs, designed to save VLAN resources of uplink devices and decrease broadcast,
are sets of VLAN pairs that share a common primary identifier. To guarantee user information
security, the ease with which to manage and account traffic for service providers, in campus
network, service providers usually require that each individual user is layer-2 separated. VLAN
feature can solve this problem. However, as stipulated by IEEE 802.1Q protocol, a device can
only support up to 4094 VLANs. If a service provider assigns one VLAN per user, the VLANs will
be far from enough; as a result, the number of users this service provider can support is limited.
Содержание
- User guide 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Explanation of the symbols on the product label 3
- Industry canada statement 3
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 12
- Chapter 1 about this guide 13
- Conventions 13
- Intended readers 13
- Overview of this guide 14
- Appearance description 19
- Chapter 2 introduction 19
- Front panel 19
- Overview of the switch 19
- Rear panel 20
- Chapter 3 login to the switch 21
- Configuration 21
- Chapter 4 system 23
- System info 23
- System summary 23
- Device description 25
- System time 26
- Daylight saving time 27
- System ip 28
- System ipv6 29
- User config 38
- User management 38
- User table 38
- Config backup 40
- Config restore 40
- System tools 40
- Firmware upgrade 41
- Access control 42
- Access security 42
- System reboot 42
- System reset 42
- Ssl config 44
- Ssh config 45
- Application example 1 for ssh 47
- Application example 2 for ssh 48
- Chapter 5 switching 53
- Port config 53
- The following entries are displayed on this screen 53
- Port mirror 54
- Port security 56
- Port isolation 57
- Loopback detection 58
- Ddm config 60
- Temperature threshold 61
- Voltage threshold 62
- Bias current threshold 63
- Rx power threshold 64
- Tx power threshold 64
- Ddm status 65
- Lag table 67
- Static lag 68
- Lacp config 69
- Traffic monitor 71
- Traffic summary 71
- Traffic statistics 72
- Address table 74
- Mac address 74
- Static address 76
- Dynamic address 77
- Filtering address 79
- Chapter 6 vlan 81
- Q vlan 82
- Vlan config 84
- Port config 86
- Configuration procedure 87
- Mac vlan 88
- Port enable 89
- Configuration procedure 90
- Protocol vlan 90
- Protocol vlan 91
- Protocol template 92
- Configuration procedure 93
- Port enable 93
- Application example for 802 q vlan 94
- Application example for mac vlan 95
- Application example for protocol vlan 97
- Vlan vpn 98
- Vpn config 99
- Vlan mapping 100
- Port enable 101
- Configuration procedure of vlan mapping function 102
- Configuration procedure of vlan vpn function 102
- Private vlan 102
- Pvlan config 107
- Port config 108
- Configuration procedure 109
- Application example for private vlan 112
- Configuration procedure 112
- Chapter 7 spanning tree 115
- Stp config 120
- Port config 122
- Stp summary 122
- Mstp instance 124
- Instance config 125
- Region config 125
- Instance port config 127
- Global configuration procedure for spanning tree function 128
- Stp security 128
- Port protect 129
- Application example for stp function 131
- Tc protect 131
- Chapter 8 ethernet oam 136
- Basic config 140
- Discovery info 141
- Link monitoring 143
- Remote loopback 145
- Statistics 146
- Event log 148
- Configuration procedure 152
- Application example for dldp 153
- Chapter 9 dhcp 155
- Dhcp relay 159
- Configuration procedure 163
- Chapter 10 multicast 164
- Igmp snooping 168
- Snooping config 170
- Vlan config 170
- Configuration procedure 172
- Port config 172
- Ip range 173
- Multicast vlan 174
- Application example for multicast vlan 176
- Static multicast ip 177
- Packet statistics 179
- Querier config 180
- Igmp authentication 182
- Mld snooping 183
- Global config 184
- Vlan config 186
- Filter config 187
- Port config 188
- Static multicast 189
- Querier config 190
- Packet statistics 191
- Ipv4 multicast table 193
- Multicast table 193
- Ipv6 multicast table 194
- Chapter 11 qos 196
- Diffserv 199
- Port priority 199
- Configuration procedure 200
- Dscp priority 200
- Configuration procedure 201
- 802 p cos mapping 202
- Configuration procedure 202
- Schedule mode 203
- Bandwidth control 204
- Rate limit 204
- Storm control 205
- Voice vlan 207
- Global config 209
- Port config 210
- Oui config 211
- Configuration procedure of voice vlan 212
- Chapter 12 acl 213
- Time range 213
- Time range summary 213
- Time range create 214
- Holiday config 215
- Acl config 216
- Acl create 216
- Acl summary 216
- Mac acl 217
- Standard ip acl 218
- Extend ip acl 219
- Combined acl 220
- Policy config 222
- Policy summary 222
- Action create 223
- Policy create 223
- Binding table 225
- Policy binding 225
- Port binding 225
- Vlan binding 226
- Application example for acl 227
- Configuration procedure 227
- Binding table 230
- Chapter 13 network security 230
- Ip mac binding 230
- Manual binding 232
- Arp scanning 233
- Dhcp snooping 235
- Dhcp snooping 238
- Option 82 239
- Arp inspection 240
- Arp detect 244
- Arp defend 245
- Configuration procedure 245
- Arp statistics 246
- Ip source guard 247
- Dos defend 249
- Dos defend 250
- Dos detect 251
- Global config 256
- Port config 258
- Configuration procedure 259
- Global config 261
- Privilege elevation 261
- Radius server config 262
- Tacacs server config 262
- Authentication server group config 263
- Authentication method list config 265
- Application authentication list config 266
- 802 x authentication server config 267
- Default settings 268
- Pppoe config 269
- Chapter 14 snmp 272
- Global config 274
- Snmp config 274
- Snmp view 275
- Snmp group 276
- Snmp user 278
- Snmp community 279
- Configuration procedure 280
- Notification 281
- Notification config 282
- Traps config 283
- History control 287
- Event config 288
- Alarm config 289
- Chapter 15 lldp 291
- Lldp working mechanism 291
- Lldpdu format 291
- Basic config 295
- Global config 296
- Port config 297
- Device info 298
- Local info 298
- Neighbor info 299
- Device statistics 300
- Elements 301
- Lldp med 301
- Global config 302
- Port config 303
- Local info 305
- Neighbor info 306
- Chapter 16 cluster 308
- Neighbor info 309
- Ndp summary 310
- Ndp config 312
- Device table 313
- Ntdp summary 315
- Ntdp config 316
- Cluster 317
- Cluster summary 317
- Cluster config 320
- Cluster topology 323
- Member config 323
- Chapter 17 maintenance 326
- Cpu monitor 326
- System monitor 326
- Memory monitor 327
- Log table 329
- Local log 330
- Backup log 331
- Remote log 331
- Device diagnostics 332
- Network diagnostics 333
- Tracert 334
- Chapter 18 system maintenance via ftp 335
- Configure the terminal emulation program 335
- Hardware installation 335
- Download firmware via bootutil menu 336
- Appendix a glossary 338
Похожие устройства
- Tp-Link T2500-28TC V2 Инструкция по установке
- Tp-Link T2500-28TC V2 Руководство по быстрому старту
- Tp-Link T2500-28TC V1 Руководство по использованию коммандной строки
- Tp-Link T2500-28TC V1 Инструкция по установке
- Tp-Link T2500-28TC V1 Руководство пользователя
- Tp-Link T2500-28TC V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство по использованию коммандной строки
- Tp-Link T3700G-52TQ V1 Инструкция по установке
- Tp-Link T3700G-52TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство пользователя
- Champion LM5127BS Деталировка
- Champion LM5127BS Инструкция по установке
- Champion LM5347BS Руководство пользователя
- Champion LM5347BS Деталировка
- Champion EM3110 Руководство пользователя
- Champion MM4026 Руководство пользователя
- Champion SA12 Руководство пользователя
- Champion SA16 Руководство пользователя
- Champion TB360 Деталировка
- Champion TB360 Руководство пользователя