Table of Contents

Advertisement

H3C WA Series WLAN Access Points
Layer 2 – LAN Switching Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W100-20100910

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WA Series and is the answer not in the manual?

Questions and answers

Summary of Contents for H3C WA Series

  • Page 1 H3C WA Series WLAN Access Points Layer 2 – LAN Switching Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910...
  • Page 2 SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners.
  • Page 3 The H3C WA documentation set includes 10 configuration guides, which describe the software features for the H3C WA series WLAN access points and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.
  • Page 4 Means an action or information that needs special attention to ensure successful configuration or good performance. Means a complementary description. Means techniques helpful for you to make configuration with ease. About the H3C WA Documentation Set The H3C WA documentation set includes: Category Documents...
  • Page 5: Obtaining Documentation

    Obtaining Documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
  • Page 6: Table Of Contents

    Table of Contents 1 Applicable Models and Software Versions ·····························································································1-1 2 Feature Matrix ············································································································································2-1 3 Command/Parameter Matrix·····················································································································3-1 4 Ethernet Interface Configuration ·············································································································4-1 General Ethernet Interface Configuration ·······························································································4-1 Configuring Basic Settings of an Ethernet Interface ·······································································4-1 Configuring Flow Control on an Ethernet Interface ·········································································4-2 Configuring Loopback Testing on an Ethernet Interface·································································4-2 Configuring a Layer 2 Ethernet Interface ································································································4-3 Layer 2 Ethernet Interface Configuration Task List·········································································4-3...
  • Page 7 Introduction to MSTP·······················································································································7-9 Protocols and Standards ···············································································································7-14 Configuration Task List ·························································································································7-14 Configuring MSTP·································································································································7-15 Configuring an MST Region ··········································································································7-15 Configuring the Root Bridge or a Secondary Root Bridge ····························································7-16 Configuring the MSTP Work Mode of the AP················································································7-17 Configuring the Priority of the AP ··································································································7-18 Configuring the Maximum Hops of an MST Region······································································7-18 Configuring the Network Diameter of a Switched Network ···························································7-19 Configuring Timers of MSTP ·········································································································7-19...
  • Page 8: Applicable Models And Software Versions

    Read this chapter before using an H3C WA series WLAN access point. Applicable Models and Software Versions H3C WA series WLAN access points include the WA2200 series and WA2600 series. Table 1-1 shows the applicable models and software versions.
  • Page 9: Feature Matrix

    Feature Matrix Support of the H3C WA series WLAN access points for features, commands and parameters may vary by device model. See this document for more information. For information about feature support, see Table 2-1. For information about command and...
  • Page 10: Command/Parameter Matrix

    Command/Parameter Matrix Table 3-1 Command/Parameter matrix Document Module Command/Parameter WA2200 series WA2600 series Not supported Supported display ip https Not supported Supported ip https acl Fundamentals Command HTTP commands ip https certificate Not supported Supported Reference access-control-policy Not supported Supported ip https enable Not supported Supported...
  • Page 11 Document Module Command/Parameter WA2200 series WA2600 series The maximum number of broadcast packets pps max-pps pps max-pps broadcast-suppression that can be ranges from 1 to ranges from 1 to { ratio | pps max-pps } forwarded on an 148810. 1488100. Ethernet interface per second The maximum...
  • Page 12: Ethernet Interface Configuration

    The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
  • Page 13: Configuring Flow Control On An Ethernet Interface

    To do… Use the command… Remarks Optional By default, the description of an interface is Change the description of the description text the interface name followed by character interface string Interface. For example, Ethernet1/0/1 Interface. Optional auto by default. Set the duplex mode duplex { auto | full | half } Optical interfaces do not support the half keyword.
  • Page 14: Configuring A Layer 2 Ethernet Interface

    To do… Use the command… Remarks Enter system view — system-view interface interface-type Enter Ethernet interface view — interface-number Optional Enable loopback testing loopback { external | internal } Disabled by default. On an interface that is physically down, you can perform only internal loopback testing. On an interface administratively shut down, you can perform neither internal nor external loopback testing.
  • Page 15: Setting The Interface Statistics Polling Interval

    To do… Use the command… Remarks Optional Set the broadcast storm broadcast-suppression { ratio | By default, broadcast traffic is not suppression threshold pps max-pps } suppressed. Optional Set the multicast storm multicast-suppression { ratio | By default, multicast traffic is not suppression threshold pps max-pps } suppressed.
  • Page 16: Displaying And Maintaining An Ethernet Interface

    Actions Port type No protective action configured A protective action configured Generate traps. Create traps and log messages. If loopback detection control is enabled, interface If loopback detection control is enabled, controlled mode. interface take the configured protective action on Hybrid or trunk port discards all incoming packets, but the interface.
  • Page 17 To do… Use the command… Remarks Display the information about the Available in any view display loopback-detection loopback function...
  • Page 18: Loopback And Null Interface Configuration

    Loopback and Null Interface Configuration This chapter includes these sections: Loopback Interface Null Interface Displaying and Maintaining Loopback and Null Interfaces Loopback Interface Introduction to Loopback Interface A loopback interface is a software-only virtual interface. The physical layer state and link layer protocols of a loopback interface are always up unless the loopback interface is manually shut down.
  • Page 19: Null Interface

    To do… Use the command… Remarks Optional Set a description for the description text By default, the description of an interface is the loopback interface interface name followed by the “Interface” string. Optional Shut down the loopback shutdown interface A loopback interface is up on being created. The subnet mask of the IP address assigned to a loopback interface can only be 32 bits in length.
  • Page 20: Displaying And Maintaining Loopback And Null Interfaces

    Displaying and Maintaining Loopback and Null Interfaces To do… Use the command… Remarks Display information about loopback display interface loopback Available in any view interfaces [ interface-number ] Display information about the null display interface null [ 0 ] Available in any view interface reset counters interface Clear the statistics on a loopback...
  • Page 21: Mac Address Table Configuration

    The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
  • Page 22: Types Of Mac Address Table Entries

    The following is how an AP learns a MAC address when it receives a frame from a port, Port A for example: Check the source MAC address (MAC-SOURCE for example) of the frame. Assume that frames with the source MAC address MAC-SOURCE can be forwarded through Port A. Look up the MAC address table by the MAC address for a match and do the following: If an entry is found for the MAC address, update the entry.
  • Page 23: Configuring A Mac Address Table

    Unicast mode: If an entry is available for the destination MAC address, the AP forwards the frame directly from the hardware. Broadcast mode: If the AP receives a frame with the destination address being all Fs, or no entry is available for the destination MAC address, the AP broadcasts the frame to all the interfaces except the receiving interface.
  • Page 24: Disabling Mac Address Learning

    To do… Use the command… Remarks Enter system view — system-view Enter interface view — interface interface-type interface-number Add/modify MAC address entries mac-address { dynamic | static } mac-address vlan Required under the specified interface view vlan-id When using the mac-address command to add a MAC address entry, the interface specified by the interface keyword must belong to the VLAN specified by the vlan keyword, and the VLAN must already exist.
  • Page 25: Configuring The Aging Timer For Dynamic Mac Address Entries

    Configuring the Aging Timer for Dynamic MAC Address Entries The MAC address table on your AP is available with an aging mechanism for dynamic entries. In this way, dynamic MAC address entries that are not updated within their aging time will be deleted to make room for new entries, and the MAC address table can be timely updated to accommodate the latest network changes.
  • Page 26: Displaying And Maintaining Mac Address Tables

    Displaying and Maintaining MAC Address Tables To do… Use the command… Remarks display mac-address [ mac-address [ vlan Display MAC address table vlan-id ] | [ [ dynamic | static ] [ interface Available in any view information interface-type interface-number ] | blackhole ] [ vlan vlan-id ] [ count ] ] Display the aging timer for Available in any view...
  • Page 27: Mstp Configuration

    The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
  • Page 28 would occur in a loop network and prevents decreased performance of network devices caused by duplicate packets received. In the narrow sense, STP refers to IEEE 802.1d STP; in the broad sense, STP refers to the IEEE 802.1d STP and various enhanced spanning tree protocols derived from that protocol. Protocol packets of STP STP uses bridge protocol data units (BPDUs), also known as configuration messages, as its protocol packets.
  • Page 29: How Stp Works

    Figure 7-1 A schematic diagram of designated bridges and designated ports All the ports on the root bridge are designated ports. Path cost Path cost is a reference value used for link selection in STP. By calculating path costs, STP selects relatively robust links and blocks redundant links, and finally prunes the network into a loop-free tree.
  • Page 30 For simplicity, the descriptions and examples below involve only four fields of configuration BPDUs: Root bridge ID (represented by bridge priority) Root path cost (related to the rate of the link connecting the port) Designated bridge ID (represented by bridge priority) Designated port ID (represented by port name) Calculation process of the STP algorithm Initial state...
  • Page 31 Selection of the root port and designated ports on a non-root bridge The process of selecting the root port and designated ports is as follows: Table 7-3 Selection of the root port and designated ports Step Description A non-root bridge regards the port on which it received the optimum configuration BPDU as the root port.
  • Page 32 Initial state of each bridge The following table shows the initial state of each bridge. Table 7-4 Initial state of each bridge Bridge Port name BPDU of port {0, 0, 0, AP1} Device A {0, 0, 0, AP2} {1, 0, 1, BP1} Device B {1, 0, 1, BP2} {2, 0, 2, CP1}...
  • Page 33 BPDU of port after Bridge Comparison process comparison Port CP1 receives the configuration BPDU of Device A {0, 0, 0, AP2}. Device C finds that the received configuration BPDU is superior to the configuration BPDU of the local port {2, 0, 2, CP1}, and updates the configuration BPDU of CP1.
  • Page 34 Figure 7-3 The final calculated spanning tree Device A With priority 0 Device B With priority 1 Device C With priority 2 The spanning tree calculation process in this example is only a simplified process. The BPDU forwarding mechanism in STP Upon network initiation, every bridge regards itself as the root bridge, generates configuration BPDUs with itself as the root, and sends the configuration BPDUs at a regular hello interval.
  • Page 35: Introduction To Rstp

    For this reason, as a mechanism for state transition in STP, the newly elected root ports or designated ports require twice the forward delay time before transiting to the forwarding state to ensure that the new configuration BPDU has propagated throughout the network. Hello time is the time interval at which a bridge sends hello packets to the surrounding bridges to ensure that the paths are fault-free.
  • Page 36 MSTP supports mapping VLANs to MST instances (MSTIs) by means of a VLAN-to-MSTI mapping table. MSTP can reduce communication overheads and resource usage by mapping multiple VLANs to one MSTI. MSTP divides a switched network into multiple regions, each containing multiple spanning trees that are independent of one another.
  • Page 37 They are physically linked with one another. For example, all the bridges in region A0 in Figure 7-4 have the same MST region configuration: The same region name, The same VLAN-to-MSTI mapping configuration (VLAN 1 is mapped to MSTI 1, VLAN 2 to MSTI 2, and the rest to the common and internal spanning tree (CIST, that is, MSTI 0), and The same MSTP revision level (not shown in the figure).
  • Page 38 Boundary port A boundary port is a port that connects an MST region to another MST region, or to a single spanning-tree region running STP, or to a single spanning-tree region running RSTP. In Figure 7-4, for example, if a bridge in region A0 is interconnected with the first port of a bridge in region D0 and the common root bridge of the entire switched network is located in region A0, the first port of that bridge in region D0 is the boundary port of region D0.
  • Page 39 Figure 7-5 helps understand these concepts. In this figure: Bridges A, B, C, and D constitute an MST region. Port 1 and port 2 of bridge A connect to the common root bridge. Port 5 and port 6 of bridge C form a loop. Port 3 and port 4 of bridge D connect downstream to other MST regions.
  • Page 40: Protocols And Standards

    Within an MST region, MSTP generates different MSTIs for different VLANs based on the VLAN-to-instance mappings. MSTP performs a separate calculation process, which is similar to spanning tree calculation in STP, for each spanning tree. For details, refer to How STP works.
  • Page 41: Configuring Mstp

    Task Remarks Configuring the Link Type of Ports Optional Configuring the Mode a Port Uses to Recognize/Send MSTP Optional Packets Enabling MSTP Required Configuring an MST Region Required Configuring the MSTP Work Mode of the AP Optional Configuring the Timeout Factor Optional Configuring the Maximum Port Rate Optional...
  • Page 42: Configuring The Root Bridge Or A Secondary Root Bridge

    To do... Use the command... Remarks Optional instance instance-id vlan vlan-list Use either command. Configure the VLAN-to-instance All VLANs in an MST region are mapping table mapped to MSTI 0 (that is, the vlan-mapping modulo modulo CIST) by default. Optional Configure the MSTP revision level revision-level level of the MST region...
  • Page 43: Configuring The Mstp Work Mode Of The

    When the root bridge of an instance fails or is shut down, the secondary root bridge (if you have specified one) can take over the role of the primary root bridge. However, if you specify a new primary root bridge for the instance then, the secondary root bridge will not become the root bridge. If you have specified multiple secondary root bridges for an instance, when the root bridge fails, MSTP will select the secondary root bridge with the lowest MAC address as the new root bridge.
  • Page 44: Configuring The Maximum Hops Of An Mst Region

    Follow these steps to configure the MSTP work mode of the AP: To do... Use the command... Remarks Enter system view — system-view Required Configure the MSTP work mode stp mode { stp | rstp | mstp } MSTP mode by default Configuring the Priority of the AP Device priorities participate in spanning tree calculation.
  • Page 45: Configuring The Network Diameter Of A Switched Network

    Follow these steps to configure the maximum number of hops of an MST region: To do... Use the command... Remarks Enter system view — system-view Required Configure the maximum hops of stp max-hops hops the MST region 20 by default Configuring the Network Diameter of a Switched Network Any two terminal devices in a switched network are connected through a specific path comprising a certain number of network devices.
  • Page 46 MSTP can detect link failures and automatically restore blocked redundant links to the forwarding state. A bridge on the CIST determines whether a configuration BPDU received by a port has expired according to the max age parameter. If yes, it starts a new spanning tree calculation process.
  • Page 47: Configuring The Timeout Factor

    The settings of hello time, forward delay and max age must meet the following formulae; otherwise, network instability will frequently occur. 2 × (forward delay – 1 second) ú max age Max age ú 2 × (hello time + 1 second) It is recommended that you specify the network diameter with the stp bridge-diameter command and let MSTP automatically calculate optimal settings of these three timers based on the network diameter.
  • Page 48: Configuring Ports As Edge Ports

    The higher the maximum port rate is, the more BPDUs will be sent within each hello time, and the more system resources will be used. By setting an appropriate maximum port rate, you can limit the rate at which the port sends BPDUs and prevent MSTP from using excessive network resources when the network becomes instable.
  • Page 49 Specifying a standard that the AP uses when calculating the default path cost You can specify a standard for the AP to use in automatic calculation for the default path cost. The AP supports the following standards: dot1d-1998: The AP calculates the default path cost for ports based on IEEE 802.1d-1998. dot1t: The AP calculates the default path cost for ports based on IEEE 802.1t.
  • Page 50: Configuring Port Priority

    If you change the standard that the AP uses in calculating the default path cost, the port path cost value set through the stp cost command will become invalid. After the path cost of a port is changed, MSTP will re-calculate the role of the port and initiate a state transition.
  • Page 51: Configuring The Link Type Of Ports

    When the priority of a port is changed, MSTP will re-calculate the role of the port and initiate a state transition. Generally, a lower priority value indicates a higher priority. If you configure the same priority value for all the ports on a bridge, the priority of a port depends on the index number of the port. Changing the priority of a port triggers a new spanning tree calculation process.
  • Page 52: Enabling Mstp

    By default, the packet format recognition mode of a port is auto, namely the port automatically distinguishes the two MSTP packet formats, and determines the format of packets it will send based on the recognized format. You can configure the MSTP packet format on a port. After the configuration, when working in MSTP mode, the port sends and receives only MSTP packets of the format you have configured to communicate with bridges that send packets of the same format.
  • Page 53: Performing Mcheck

    To do... Use the command... Remarks Optional Enable MSTP for the ports stp enable By default, MSTP is enabled for all ports after it is enabled for the AP globally. To control MSTP flexibly, you can use the undo stp enable command to disable MSTP for certain ports so that they will not take part in spanning tree calculation and thus to save the CPU resources of the AP.
  • Page 54: Configuring Digest Snooping

    An mCheck operation takes effect on a bridge only when MSTP operates in RSTP or MSTP mode. Configuring Digest Snooping As defined in IEEE 802.1s, connected bridges are in the same region only when the MST region-related configurations (domain name, revision level, VLAN-to-instance mappings) on them are identical. An MSTP bridge identifies bridges in the same MST region by checking the configuration ID in configuration BPDUs.
  • Page 55 With Digest Snooping enabled, comparison of configuration digest is no longer performed for in-the-same-region check, so the VLAN-to-instance mappings must be the same on associated ports. With global Digest Snooping enabled, modification of VLAN-to-instance mappings and removing of the current region configuration with the undo stp region-configuration command are not allowed.
  • Page 56: Configuring No Agreement Check

    [AP B-Ethernet1/0/1] stp config-digest-snooping [AP B-Ethernet1/0/1] quit [AP B] stp config-digest-snooping Configuring No Agreement Check In RSTP and MSTP, two types of messages are used for rapid state transition on designated ports: Proposal: sent by designated ports to request rapid transition Agreement: used to acknowledge rapid transition requests Both RSTP and MSTP bridges can perform rapid transition on a designated port only when the port receives an agreement packet from the downstream bridge.
  • Page 57 If the upstream bridge is a third-party device, the rapid state transition implementation may be limited. For example, when the upstream bridge uses a rapid transition mechanism similar to that of RSTP, and the downstream bridge adopts MSTP and does not work in RSTP mode, the root port on the downstream bridge receives no agreement packet from the upstream bridge and thus sends no agreement packets to the upstream bridge.
  • Page 58: Configuring Protection Functions

    Configuring Protection Functions An MSTP bridge supports the following protection functions: BPDU guard Root guard Loop guard TC-BPDU guard Among loop guard, root guard and edge port settings, only one function can take effect on the same port at the same time. Configuration prerequisites MSTP has been correctly configured on the AP.
  • Page 59 Enabling root guard The root bridge and secondary root bridge of a spanning tree should be located in the same MST region. Especially for the CIST, the root bridge and secondary root bridge are generally put in a high-bandwidth core region during network design. However, due to possible configuration errors or malicious attacks in the network, the legal root bridge may receive a configuration BPDU with a higher priority.
  • Page 60: Displaying And Maintaining Mstp

    Follow these steps to enable loop guard: To do... Use the command... Remarks Enter system view — system-view Enter Ethernet interface view or interface interface-type Enter interface WLAN Mesh interface view interface-number Required view or port Use either command. group view port-group manual Enter port group view port-group-name...
  • Page 61: Mstp Configuration Example

    To do... Use the command... Remarks View the historical information of port role display stp [ instance calculation for the specified MSTI or all Available in any view instance-id ] history MSTIs View the statistics of TC/TCN BPDUs display stp [ instance Available in any view sent and received by all ports in the instance-id ] tc...
  • Page 62 [AP A-mst-region] region-name example [AP A-mst-region] instance 1 vlan 10 [AP A-mst-region] instance 2 vlan 20 [APA-mst-region] revision-level 0 # Activate MST region configuration. [AP A-mst-region] active region-configuration [AP A-mst-region] quit # Enable MSTP globally. [AP A] stp enable # View the MST region configuration information that has taken effect. [AP A] display stp region-configuration Oper configuration Format selector...
  • Page 63 [AP C] stp region-configuration # Configure the region name, VLAN-to-instance mappings and revision level of the MST region. [AP C-mst-region] instance 1 vlan 10 [AP C-mst-region] instance 2 vlan 20 [AP C-mst-region] revision-level 0 # Activate MST region configuration manually. [AP C-mst-region] active region-configuration [AP C-mst-region] quit # Enable MSTP globally.
  • Page 64: Vlan Configuration

    The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
  • Page 65: Vlan Fundamentals

    Figure 8-1 A VLAN diagram VLAN 2 Switch A Switch B Router VLAN 5 A VLAN is logically divided on an organizational basis rather than on a physical basis. For example, all workstations and servers used by a particular workgroup can be connected to the same LAN, regardless of their physical locations.
  • Page 66: Types Of Vlan

    Figure 8-3 The position and format of VLAN tag A VLAN tag comprises four fields: tag protocol identifier (TPID), priority, canonical format indicator (CFI), and VLAN ID. The 16-bit TPID field with a default value of 0x8100 indicates that the frame is VLAN-tagged. The 3-bit priority field indicates the 802.1p priority of the frame.
  • Page 67: Configuring Basic Settings Of A Vlan Interface

    To do… Use the command… Remarks Required If the specified VLAN does not exist, Enter VLAN view this command creates the VLAN first. vlan vlan-id By default, only the default VLAN (that is, VLAN 1) exists in the system. Optional Configure a name for the current name text By default, the name of a VLAN is its...
  • Page 68: Port-Based Vlan Configuration

    To do… Use the command… Remarks Optional By default, a VLAN interface is in the up state. In this case, the VLAN interface is up so long as one port in the VLAN is up and goes down if all Bring up the VLAN interface ports in the VLAN go down.
  • Page 69: Assigning An Access Port To A Vlan

    vlan command, the default VLAN of the port changes to VLAN 1. The removal of the VLAN specified as the default VLAN of a trunk or hybrid port, however, does not affect the default VLAN setting on the port. It is recommended that you set the same default VLAN ID for the local and remote ports. Ensure that a port is assigned to its default VLAN.
  • Page 70: Assigning A Trunk Port To A Vlan

    To do… Use the command… Remarks Required Assign one or multiple access port interface-list ports to the current VLAN By default, all ports belong to VLAN 1. In Ethernet interface view or WLAN-BSS interface view Follow these steps to assign an access port in interface view to a VLAN: To do…...
  • Page 71: Assigning A Hybrid Port To A Vlan

    To change the link type of a port from trunk to hybrid or vice versa, you must set the link type to access first. After configuring the default VLAN for a trunk port, you must use the port trunk permit vlan command to configure the trunk port to allow packets from the default VLAN to pass through, so that the egress port can forward packets from the default VLAN.
  • Page 72: Configuring A Mac Address-Based Vlan

    MAC-based VLAN implementation With MAC-based VLAN configured, the AP processes received packets as follows: When receiving an untagged frame, the AP looks up the list of MAC-to-VLAN mappings based on the source MAC address of the frame for a match. Two matching modes are available: exact matching and fuzzy matching.
  • Page 73: Displaying And Maintaining Vlan

    To do... Use the command... Remarks mac-vlan mac-address Associate MAC addresses mac-address [ mask mac-mask ] Required with a VLAN vlan vlan-id [ priority priority ] interface interface-type Enter interface view Required. interface-number Configure the link type of Required port link-type hybrid the port as hybrid Required Assign the current hybrid...
  • Page 74 Figure 8-4 Network diagram for port-based VLAN configuration Configuration procedure Configure AP # Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100. <AP> system-view [AP] vlan 2 [AP-vlan2] quit [AP] vlan 100 [AP-vlan100] vlan 6 to 50 Please wait... Done. # Enter Ethernet 1/0/1 interface view.
  • Page 75 Port link-type: trunk VLAN passing : 2, 6-50, 100 VLAN permitted: 2, 6-50, 100 Trunk port encapsulation: IEEE 802.1q Port priority: 0 Last 300 seconds input: 0 packets/sec 0 bytes/sec Last 300 seconds output: 0 packets/sec 0 bytes/sec Input (total): 0 packets, 0 bytes 0 broadcasts, 0 multicasts Input (normal):...
  • Page 76: Index

    Index Configuration Task List 7-14 Port-Based VLAN Configuration Configuring a Layer 2 Ethernet Interface Configuring a MAC Address Table VLAN Configuration Example 8-10 Configuring Basic Settings of a VLAN Interface Configuring Basic VLAN Settings Configuring MSTP 7-15 Displaying and Maintaining an Ethernet Interface Displaying and Maintaining Loopback and Null Interfaces...

Table of Contents