Tp-Link T2500-28TC V2 [81/342] Chapter 6 vlan
![Tp-Link T2500-28TC V2 [81/342] Chapter 6 vlan](/views2/1471213/page81/bg51.png)
70
Chapter 6 VLAN
The traditional Ethernet is a data network communication technology basing on CSMA/CD
(Carrier Sense Multiple Access/Collision Detect) via shared communication medium. Through
the traditional Ethernet, the overfull hosts in LAN will result in serious collision, flooding
broadcasts, poor performance or even breakdown of the Internet. Though connecting the
LANs through switches can avoid the serious collision, the flooding broadcasts cannot be
prevented, which will occupy plenty of bandwidth resources, causing potential serious security
problems.
A Virtual Local Area Network (VLAN) is a network topology configured according to a logical
scheme rather than the physical layout. The VLAN technology is developed for switches to
control broadcast in LANs. By creating VLANs in a physical LAN, you can divide the LAN into
multiple logical LANs, each of which has a broadcast domain of its own. Hosts in the same
VLAN communicate with one another as if they are in a LAN. However, hosts in different VLANs
cannot communicate with one another directly. Therefore, broadcast packets are limited in a
VLAN. Hosts in the same VLAN communicate with one another via Ethernet whereas hosts in
different VLANs communicate with one another through the Internet devices such as Router,
the Layer3 switch, etc. The following figure illustrates a VLAN implementation.
Figure 6-1 VLAN implementation
Compared with the traditional Ethernet, VLAN enjoys the following advantages.
1. Broadcasts are confined to VLANs. This decreases bandwidth utilization and improves
network performance.
2. Network security is improved. VLANs cannot communicate with one another directly. That
is, a host in a VLAN cannot access resources in another VLAN directly, unless routers or
Layer 3 switches are used.
3. Network configuration workload for the host is reduced. VLAN can be used to group
specific hosts. When the physical position of a host changes within the range of the VLAN,
you need not to change its network configuration.
A VLAN can span across multiple switches, or even routers. This enables hosts in a VLAN to be
dispersed in a looser way. That is, hosts in a VLAN can belong to different physical network
Содержание
- User guide 1
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Explanation of the symbols on the product label 3
- Industry canada statement 3
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 12
- Chapter 1 about this guide 13
- Conventions 13
- Intended readers 13
- Overview of this guide 14
- Appearance description 19
- Chapter 2 introduction 19
- Front panel 19
- Overview of the switch 19
- Rear panel 20
- Chapter 3 login to the switch 21
- Configuration 21
- Chapter 4 system 23
- System info 23
- System summary 23
- Device description 25
- System time 26
- Daylight saving time 27
- System ip 28
- System ipv6 29
- User config 38
- User management 38
- User table 38
- Config backup 40
- Config restore 40
- System tools 40
- Firmware upgrade 41
- Access control 42
- Access security 42
- System reboot 42
- System reset 42
- Ssl config 44
- Ssh config 45
- Application example 1 for ssh 47
- Application example 2 for ssh 48
- Chapter 5 switching 53
- Port config 53
- The following entries are displayed on this screen 53
- Port mirror 54
- Port security 56
- Port isolation 57
- Loopback detection 58
- Ddm config 60
- Temperature threshold 61
- Voltage threshold 62
- Bias current threshold 63
- Rx power threshold 64
- Tx power threshold 64
- Ddm status 65
- Lag table 67
- Static lag 68
- Lacp config 69
- Traffic monitor 71
- Traffic summary 71
- Traffic statistics 72
- Address table 74
- Mac address 74
- Static address 76
- Dynamic address 77
- Filtering address 79
- Chapter 6 vlan 81
- Q vlan 82
- Vlan config 84
- Port config 86
- Configuration procedure 87
- Mac vlan 88
- Port enable 89
- Configuration procedure 90
- Protocol vlan 90
- Protocol vlan 91
- Protocol template 92
- Configuration procedure 93
- Port enable 93
- Application example for 802 q vlan 94
- Application example for mac vlan 95
- Application example for protocol vlan 97
- Vlan vpn 98
- Vpn config 99
- Vlan mapping 100
- Port enable 101
- Configuration procedure of vlan mapping function 102
- Configuration procedure of vlan vpn function 102
- Private vlan 102
- Pvlan config 107
- Port config 108
- Configuration procedure 109
- Application example for private vlan 112
- Configuration procedure 112
- Chapter 7 spanning tree 115
- Stp config 120
- Port config 122
- Stp summary 122
- Mstp instance 124
- Instance config 125
- Region config 125
- Instance port config 127
- Global configuration procedure for spanning tree function 128
- Stp security 128
- Port protect 129
- Application example for stp function 131
- Tc protect 131
- Chapter 8 ethernet oam 136
- Basic config 140
- Discovery info 141
- Link monitoring 143
- Remote loopback 145
- Statistics 146
- Event log 148
- Configuration procedure 152
- Application example for dldp 153
- Chapter 9 dhcp 155
- Dhcp relay 159
- Configuration procedure 163
- Chapter 10 multicast 164
- Igmp snooping 168
- Snooping config 170
- Vlan config 170
- Configuration procedure 172
- Port config 172
- Ip range 173
- Multicast vlan 174
- Application example for multicast vlan 176
- Static multicast ip 177
- Packet statistics 179
- Querier config 180
- Igmp authentication 182
- Mld snooping 183
- Global config 184
- Vlan config 186
- Filter config 187
- Port config 188
- Static multicast 189
- Querier config 190
- Packet statistics 191
- Ipv4 multicast table 193
- Multicast table 193
- Ipv6 multicast table 194
- Chapter 11 qos 196
- Diffserv 199
- Port priority 199
- Configuration procedure 200
- Dscp priority 200
- Configuration procedure 201
- 802 p cos mapping 202
- Configuration procedure 202
- Schedule mode 203
- Bandwidth control 204
- Rate limit 204
- Storm control 205
- Voice vlan 207
- Global config 209
- Port config 210
- Oui config 211
- Configuration procedure of voice vlan 212
- Chapter 12 acl 213
- Time range 213
- Time range summary 213
- Time range create 214
- Holiday config 215
- Acl config 216
- Acl create 216
- Acl summary 216
- Mac acl 217
- Standard ip acl 218
- Extend ip acl 219
- Combined acl 220
- Policy config 222
- Policy summary 222
- Action create 223
- Policy create 223
- Binding table 225
- Policy binding 225
- Port binding 225
- Vlan binding 226
- Application example for acl 227
- Configuration procedure 227
- Binding table 230
- Chapter 13 network security 230
- Ip mac binding 230
- Manual binding 232
- Arp scanning 233
- Dhcp snooping 235
- Dhcp snooping 238
- Option 82 239
- Arp inspection 240
- Arp detect 244
- Arp defend 245
- Configuration procedure 245
- Arp statistics 246
- Ip source guard 247
- Dos defend 249
- Dos defend 250
- Dos detect 251
- Global config 256
- Port config 258
- Configuration procedure 259
- Global config 261
- Privilege elevation 261
- Radius server config 262
- Tacacs server config 262
- Authentication server group config 263
- Authentication method list config 265
- Application authentication list config 266
- 802 x authentication server config 267
- Default settings 268
- Pppoe config 269
- Chapter 14 snmp 272
- Global config 274
- Snmp config 274
- Snmp view 275
- Snmp group 276
- Snmp user 278
- Snmp community 279
- Configuration procedure 280
- Notification 281
- Notification config 282
- Traps config 283
- History control 287
- Event config 288
- Alarm config 289
- Chapter 15 lldp 291
- Lldp working mechanism 291
- Lldpdu format 291
- Basic config 295
- Global config 296
- Port config 297
- Device info 298
- Local info 298
- Neighbor info 299
- Device statistics 300
- Elements 301
- Lldp med 301
- Global config 302
- Port config 303
- Local info 305
- Neighbor info 306
- Chapter 16 cluster 308
- Neighbor info 309
- Ndp summary 310
- Ndp config 312
- Device table 313
- Ntdp summary 315
- Ntdp config 316
- Cluster 317
- Cluster summary 317
- Cluster config 320
- Cluster topology 323
- Member config 323
- Chapter 17 maintenance 326
- Cpu monitor 326
- System monitor 326
- Memory monitor 327
- Log table 329
- Local log 330
- Backup log 331
- Remote log 331
- Device diagnostics 332
- Network diagnostics 333
- Tracert 334
- Chapter 18 system maintenance via ftp 335
- Configure the terminal emulation program 335
- Hardware installation 335
- Download firmware via bootutil menu 336
- Appendix a glossary 338
Похожие устройства
- Tp-Link T2500-28TC V2 Инструкция по установке
- Tp-Link T2500-28TC V2 Руководство по быстрому старту
- Tp-Link T2500-28TC V1 Руководство по использованию коммандной строки
- Tp-Link T2500-28TC V1 Инструкция по установке
- Tp-Link T2500-28TC V1 Руководство пользователя
- Tp-Link T2500-28TC V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство по использованию коммандной строки
- Tp-Link T3700G-52TQ V1 Инструкция по установке
- Tp-Link T3700G-52TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство пользователя
- Champion LM5127BS Деталировка
- Champion LM5127BS Инструкция по установке
- Champion LM5347BS Руководство пользователя
- Champion LM5347BS Деталировка
- Champion EM3110 Руководство пользователя
- Champion MM4026 Руководство пользователя
- Champion SA12 Руководство пользователя
- Champion SA16 Руководство пользователя
- Champion TB360 Деталировка
- Champion TB360 Руководство пользователя