H3C S7500 Series Operation Manual(Release 3100 Series)-(V1.04)

HomeSupportSwitchesH3C S7500 Switch SeriesConfigure & DeployConfiguration GuidesH3C S7500 Series Operation Manual(Release 3100 Series)-(V1.04)
05-Extended VLAN Application Configuration
Title Size Download
05-Extended VLAN Application Configuration 315 KB

Table of Contents

Chapter 1 Voice VLAN Configuration. 1-1

1.1 Voice VLAN Overview. 1-1

1.2 Voice VLAN Configuration. 1-4

1.2.1 Configuration Prerequisites. 1-4

1.2.2 Setting Voice VLAN Mode on a Port to Automatic Mode. 1-4

1.2.3 Setting Voice VLAN Mode on a Port to Manual Mode. 1-5

1.3 Displaying Voice VLAN Configuration. 1-7

1.4 Voice VLAN Configuration Examples. 1-7

1.4.1 Configuring Automatic Voice VLAN Mode. 1-7

1.4.2 Configuring Manual Voice VLAN Mode. 1-8

Chapter 2 Isolate-User-VLAN Configuration. 2-1

2.1 Isolate-User-VLAN Overview. 2-1

2.1.1 Introduction to Isolate-User-VLAN. 2-1

2.1.2 Isolate-User-VLAN Packets Forwarding Process. 2-1

2.2 Isolate-User-VLAN Configuration. 2-3

2.2.1 Isolate-User-VLAN Configuration Task List 2-3

2.2.2 Configuring Isolate-User-VLAN. 2-3

2.2.3 Configuring Secondary VLAN. 2-3

2.2.4 Adding Ports to Isolate-User-VLAN and Secondary VLAN. 2-4

2.2.5 Configuring Mapping Between Isolate-User-VLAN and Secondary VLAN. 2-4

2.3 Displaying Isolate-User-VLAN Configuration. 2-5

2.4 Isolate-User-VLAN Configuration Example. 2-5

2.4.1 Network requirements. 2-5

2.4.2 Network diagram.. 2-6

2.4.3 Configuration procedure. 2-6

Chapter 3 Super VLAN. 3-1

3.1 Super VLAN Overview. 3-1

3.2 Super VLAN Configuration. 3-1

3.2.1 Super VLAN Configuration Task List 3-1

3.2.2 Configuring a Super VLAN. 3-2

3.2.3 Configuring a Sub VLAN. 3-2

3.2.4 Configuring the Mapping between a Super VLAN and Sub VLANs. 3-3

3.2.5 Configuring Super VLAN to Support DHCP Relay. 3-3

3.3 Displaying Super VLAN. 3-4

3.4 Super VLAN Configuration Examples. 3-5

3.4.1 Super VLAN Configuration Example. 3-5

3.4.2 Super VLAN Supporting DHCP Relay Example. 3-6

 


Chapter 1  Voice VLAN Configuration

When configuring voice VLAN, go to these sections for information you are interested in:

l           Voice VLAN Overview

l           Voice VLAN Configuration

l           Displaying Voice VLAN Configuration

l           Voice VLAN Configuration Examples

1.1  Voice VLAN Overview

Voice VLANs are VLANs configured specially for voice data stream. By adding the ports that connect voice devices to voice VLANs, you can configure quality of service (QoS) attributes for voice data, increasing the transmission priority of voice data stream and ensuring voice quality.

S7500 series Ethernet switches determine whether a received packet is a voice packet by checking its source MAC address. Packets containing source MAC addresses that comply with the voice device organizationally unique identifier (OUI) addresses are regarded as voice traffic and are transmitted in the voice VLAN.

You can configure OUI addresses in advance or use the default OUI addresses.

 

&  Note:

An OUI address is a globally unique identifier assigned to a vendor by IEEE. You can determine which vendor a device belongs to according to the OUI address which forms the first 24 bits of a MAC address.

 

The following table shows the five default OUI addresses of a switch.

Table 1-1 Default OUI addresses preset by the switch

Number

OUI Address

Vendor

1

00e0-bb00-0000

3com phone

2

0003-6b00-0000

Cisco phone

3

00e0-7500-0000

Polycom phone

4

00d0-1e00-0000

Pingtel phone

5

000f-e200-0000

H3C Aolynk phone

 

There are two voice VLAN modes on a port: automatic and manual. You can configure the voice VLAN mode of a port according to data stream passing through the port.

l           In automatic voice VLAN mode: In automatic voice VLAN mode, the system identifies the source MAC address contained in the untagged packet sent when the IP phone is powered on and matches it against the OUI addresses. If a match is found, the system will automatically add the port into the voice VLAN. An aging time can be configured for the voice VLAN. The system will remove a port from the voice VLAN if no voice packet is received from it after the aging time. The adding and deleting of ports are automatically realized by the system.

l           In manual voice VLAN mode: administrators need to execute related commands to add an IP phone access port to the voice VLAN or remove an IP phone access port from the voice VLAN.

For the tagged packets sent by IP voice devices, they are processed in the same way in either of the above two modes: forwarded within corresponding VLAN according to their VLAN ID in the tags.

Voice VLAN packets can be forwarded by trunk ports and hybrid ports in voice VLAN. You can enable a trunk port or a hybrid port belonging to other VLANs to forward voice and service packets simultaneously by enabling the voice VLAN function for it.

As multiple types of IP voice devices exist, you need to match the voice VLAN mode of a port with the type of voice stream sent by IP voice devices, as listed in Table 1-2.

Table 1-2 Matching relationship between port modes and voice stream types

Port voice VLAN mode

Voice stream type

Port type

Supported or not

Automatic mode

Tagged voice stream

Access

Not supported

Trunk

Supported

Make sure the default VLAN of the IP phone access port exists and is not the voice VLAN. And the IP phone access port permits the packets of the default VLAN to pass.

Hybrid

Supported

Make sure the default VLAN of the IP phone access port exists and is in the list of the tagged VLANs whose packets are permitted by the access port.

Untagged voice stream

Access

Not supported, because the default VLAN of the IP phone access port must be the voice VLAN and the IP phone access port should be in the voice VLAN. Doing so, you add the port to the voice VLAN manually.

Trunk

Hybrid

Manual mode

Tagged voice stream

Access

Not supported

Trunk

Supported

Make sure the default VLAN of the IP phone access port exists and is not the voice VLAN. And the access port permits the packets of the default VLAN.

Hybrid

Supported

Make sure the default VLAN of the IP phone access port exists and is in the list of the tagged VLANs whose packets are permitted by the access port.

Untagged voice stream

Access

Supported

Make sure the default VLAN of the IP phone access port is the voice VLAN.

Trunk

Supported

Make sure the default VLAN of the port is the voice VLAN and the port permits the packets of the default VLAN.

Hybrid

Supported

Make sure the default VLAN of the port is a voice VLAN and is in the list of untagged VLANs whose packets are permitted by the port.

 

  Caution:

l      If the voice traffic sent by an IP voice device is tagged and the access port has 802.1x authentication and guest VLAN enabled, assign different VLAN IDs for the voice VLAN, the default VLAN of the access port, and the 802.1x guest VLAN.

l      If the voice traffic sent by the IP voice device is untagged, to realize the voice VLAN feature, the default VLAN of the IP phone access port can only be configured as the voice VLAN. Note that at this time 802.1 x authentication function cannot be realized.

 

1.2  Voice VLAN Configuration

1.2.1  Configuration Prerequisites

l           Create the corresponding VLAN before configuring the voice VLAN.

l           VLAN 1 is the default VLAN and needs not to be created. But VLAN 1 does not support the voice VLAN function.

1.2.2  Setting Voice VLAN Mode on a Port to Automatic Mode

Follow these steps to set the voice VLAN mode on a port to automatic:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet port view

interface interface-type interface-number

Required

Enable the voice VLAN function for the port

voice vlan enable

Required

By default, the voice VLAN function is disabled.

Set the voice VLAN mode on the port to automatic mode

voice vlan mode auto

Optional

The default voice VLAN mode on the port is automatic.

Return to system view

quit

Set an OUI address that can be identified by the voice VLAN

voice vlan mac-address oui mask oui-mask [ description text ]

Optional

By default, the switch uses the default OUI addresses to determine the voice stream.

Enable the voice VLAN security mode

voice vlan security enable

Optional

By default, the voice VLAN security mode on the port is enabled.

Set the aging time for the voice VLAN

voice vlan aging minutes

Optional

The default aging time is 1,440 minutes.

Enable the voice VLAN function globally

voice vlan vlan-id enable

Required

 

&  Note:

If the voice VLAN of a device suffers a restart of the device during normal operation, in order to make the established voice connection works normally, the system will add the port whose voice VLAN mode is configured as automatic into the voice VLAN automatically after the restart, instead of waiting for the trigger of voice traffic.

 

1.2.3  Setting Voice VLAN Mode on a Port to Manual Mode

Follow these steps to set the voice VLAN mode on a port to manual mode:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter port view

interface interface-type interface-number

Required

Enable the voice VLAN function for the port

voice vlan enable

Required

By default, the voice VLAN function is disabled on a port.

Set voice VLAN mode on the port to manual mode

undo voice vlan mode auto

Required

The default voice VLAN mode on a port is automatic.

Return to system view

quit

Add a manual mode port to the voice VLAN

Access port

Enter VLAN view

vlan vlan-id

Required

Add the port to the VLAN

port interface-list

Trunk or Hybrid port

Enter port view

interface interface-type interface-number

Add the port to the voice VLAN

port trunk permit vlan vlan-id

port hybrid vlan vlan-id { tagged | untagged }

Configure the voice VLAN to be the default VLAN of the port

port trunk pvid vlan vlan-id

port hybrid pvid vlan vlan-id

Optional

Refer to Table 1-2 to determine whether or not this operation is needed.

Return to system view

quit

Set an OUI address that can be identified by the voice VLAN

voice vlan mac-address oui mask oui-mask [ description text ]

Optional

If you do not set the address, the default OUI addresses will be used.

Enable the voice VLAN security mode

voice vlan security enable

Optional

By default, the voice VLAN security mode on a port is enabled.

Set aging time for the voice VLAN

voice vlan aging minutes

Optional

The default aging time is 1,440 minutes.

Enable the voice VLAN function globally

voice vlan vlan-id enable

Required

 

  Caution:

l      You can enable the voice VLAN feature for only one VLAN at a moment.

l      A port that has the link aggregation control protocol (LACP) enabled cannot have the voice VLAN feature enabled at the same time.

l      A port that has the QinQ or RRPP enabled cannot have the voice VLAN feature enabled at the same time.

l      Voice VLAN function can be effective only for the static VLAN. Once a dynamic VLAN is enabled with voice VLAN function, it automatically becomes a static VLAN.

l      When the voice VLAN mode on a port is the security mode, the device only permits packets whose source addresses are the voice OUI addresses that can be identified. Packets whose source addresses cannot be identified, including certain authentication packets (such as 802.1x authentication packets), will be dropped. So, do not transmit both voice data and service data in the voice VLAN. If you have to do so, make sure the voice VLAN security mode is disabled.

 

1.3  Displaying Voice VLAN Configuration

To do…

Use the command…

Remarks

Display the voice VLAN configuration status

display voice vlan status

Available in any view.

Display the currently valid OUI addresses

display voice vlan oui

Display the ports operating in the voice VLAN

display vlan vlan-id

 

1.4  Voice VLAN Configuration Examples

1.4.1  Configuring Automatic Voice VLAN Mode

I. Network requirements

l           Create VLAN 2 and configure it as the voice VLAN.

l           Configure Ethernet 1/0/1 as a Trunk port, with VLAN 6 as the default VLAN of the port.

l           Ethernet 1/0/1 can be added to/removed from the voice VLAN automatically according to the type of the data stream that reaches the port.

II. Configuration procedure

# Create VLAN 2.

<H3C> system-view

[H3C] vlan 2

# Configure Ethernet 1/0/1 to be a Trunk port, with VLAN 6 as its default VLAN.

[H3C-vlan2] quit

[H3C] interface Ethernet 1/0/1

[H3C-Ethernet1/0/1] port link-type trunk

[H3C-Ethernet1/0/1] port trunk pvid vlan 6

# Enable the voice VLAN function for the port and set the voice VLAN mode on the port to automatic mode.

[H3C-Ethernet1/0/1] voice vlan enable

[H3C-Ethernet1/0/1] voice vlan mode auto

# Enable the voice VLAN function globally.

[H3C-Ethernet1/0/1] quit

[H3C] voice vlan 2 enable

1.4.2  Configuring Manual Voice VLAN Mode

I. Network requirements

l           Create VLAN 3 and configure it as the voice VLAN.

l           Configure Ethernet 1/0/1 as a Trunk port and can be added to/removed from the voice VLAN manually.

l           Configure the OUI address to be 0011-2200-0000, with the description string being test.

II. Configuration procedure

# Create VLAN 3.

<H3C> system-view

[H3C] vlan 3

[H3C-vlan3] quit

# Configure Ethernet 1/0/3 to be a Trunk port and add it to VLAN 3.

[H3C] interface Ethernet1/0/3

[H3C-Ethernet1/0/3] port link-type trunk

[H3C-Ethernet1/0/3] port trunk permit vlan 3

# Enable the voice VLAN function for the port and set the voice VLAN mode on the port to manual mode.

[H3C-Ethernet1/0/3] voice vlan enable

[H3C-Ethernet1/0/3] undo voice vlan mode auto

[H3C-Ethernet1/0/3] quit

# Specify an OUI address.

[H3C] voice vlan mac-address 0011-2200-0000 mask ffff-ff00-0000 description test

# Enable the voice VLAN function globally.

[H3C] voice vlan 3 enable

# Display voice VLAN-related configurations.

[H3C] display voice vlan status

Voice Vlan status: ENABLE

Voice Vlan ID: 3

Voice Vlan security mode: Security

Voice Vlan aging time: 1440 minutes

Current voice vlan enabled port mode:

PORT                     MODE

----------------------------------------

Ethernet1/0/3            MANUAL

# Remove Ethernet 1/0/3 from the voice VLAN.

[H3C] interface Ethernet1/0/3

[H3C-Ethernet1/0/3] undo port trunk permit vlan 3

 


Chapter 2  Isolate-User-VLAN Configuration

When configuring isolate-user-VLAN, go to these sections for information you are interested in:

l           Isolate-User-VLAN Overview

l           Isolate-User-VLAN Configuration

l           Displaying Isolate-User-VLAN Configuration

l           Isolate-User-VLAN Configuration Example

2.1  Isolate-User-VLAN Overview

2.1.1  Introduction to Isolate-User-VLAN

Isolate-user-VLAN is designed for saving VLAN resource by means of copying MAC address entries among the MAC address tables of VLANs, utilizing the feature that a Hybrid port can remove the VLAN tags of packets of multiple VLANs.

Isolate-user-VLAN adopts Layer 2 VLAN structure, and you need to configure two types of VLANs, isolate-user-VLAN and secondary VLAN.

An isolate-user-VLAN corresponds to multiple secondary VLANs. By configuring ports as Hybrid ports, you can make ports of all secondary VLANs and the uplink port of the switch all included in the isolate-user-VLAN. At the same time, you should configure that the uplink port removes the VLAN tags of all secondary VLAN packets when forwarding them.

In this case, for the upper layer switch, all the packets received from the lower stream are without VLAN tags. Therefore, the switch can reset the local VLAN structure to save VLAN resource without considering the VLAN configuration in the lower layer.

2.1.2  Isolate-User-VLAN Packets Forwarding Process

Figure 2-1 is the diagram for isolate-user-VLAN application. The following content describes the isolate-user-VLAN packets forwarding process based on this figure.

I. Configure Switch B

l           Configure port Ethernet 1/0/4 as a Hybrid port, with the default VLAN ID being 3. This port belongs to both VLAN 3 and VLAN 5 (the isolate-user-VLAN), and performs untag operation (removing of VLAN tag) on packets coming from VLAN 3 and VLAN 5.

l           Configure port Ethernet 1/0/1 as a Hybrid port, with the default VLAN ID being 5. This port belongs to both VLAN 3 and VLAN 5, and performs untag operation (removing of VLAN tag) on packets coming from VLAN 3 and VLAN 5.

II. Configure Switch A

To ensure that packets coming from Switch A can be forwarded by Switch B according to the VLAN configurations of the lower layer devices, you need to configure the port through which Switch A connects to Switch B to remove VLAN tags when Switch A sends packets to Switch B.

Figure 2-1 Diagram for isolate-user-VLAN application

III. Forward packets to Switch A

1)         When packets sent by PC reaches Ethernet 1/0/4, the default VLAN ID, that is, the VLAN tag of VLAN 3 is automatically added to the packets.

2)         Switch B learns the MAC address of the PC, and adds it to the MAC address forwarding table of VLAN 3, and at the same time copies the entry to the MAC address forwarding table of VLAN 5.

3)         Because Ethernet 1/0/1 belongs to VLAN 3, Ethernet 1/0/1 can forward the packets from VLAN 3 and automatically removes the tag of VLAN 3, so that packets reaching Switch A is without the VLAN tag.

IV. Receive and forward packets from Switch A

1)         When packets coming from Switch A (the packets are without VLAN tag through certain configuration) reach to port Ethernet 1/0/1 of Switch B, the packets are automatically added with default VLAN ID, that is, the tag of VLAN 5.

2)         According to the MAC address forwarding table copied in the outbound process, the system will find the egress port being Ethernet 1/0/4.

3)         Because Ethernet 1/0/4 belongs to VLAN 5, packets can pass through it normally, and at the same time, Ethernet 1/0/4 removes the VLAN tag of the packets. So that the PC receives packets without VLAN tag.

2.2  Isolate-User-VLAN Configuration

2.2.1  Isolate-User-VLAN Configuration Task List

Complete the following tasks to configure Isolate-user-VLAN:

Task

Remarks

Configuring Isolate-User-VLAN

Required

Configuring Secondary VLAN

Required

Adding Ports to Isolate-User-VLAN and Secondary VLAN

Required

Configuring Mapping Between Isolate-User-VLAN and Secondary VLAN

Required

 

2.2.2  Configuring Isolate-User-VLAN

Follow these steps to configure an isolate-user-VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Create a VLAN and enter VLAN view

vlan vlan-id

Required

Configure the VLAN as an isolate-user-VLAN

isolate-user-vlan enable

Required

 

  Caution:

l      Multiple isolate-user-VLANs can be configured for a switch.

l      With GVRP function enabled, a switch cannot be enabled with isolate-user-VLAN function.

l      Isolate-user-VLANs do not forward multicast service data.

l      You cannot enable both the isolate-user-VLAN function and super VLAN function for a VLAN. If a VLAN is specified as an isolate-user-VLAN or a secondary VLAN, you cannot configure it as a super VLAN or a sub VLAN additionally.

 

2.2.3  Configuring Secondary VLAN

Configuring a secondary VLAN is the same as configuring an ordinary VLAN.

Follow these steps to configure a secondary VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Create a secondary VLAN

vlan vlan-id

Required

 

2.2.4  Adding Ports to Isolate-User-VLAN and Secondary VLAN

In order to transmit packets normally, all ports included in the isolate-user-VLAN and the secondary VLANs must be Hybrid ports, and all ports must perform untag operation on all VLAN packets.

Follow these steps to add ports to isolate-user-VLAN and secondary VLANs and configure the ports to untag packets:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet port view

interface interface-type interface-number

Configure the port as a hybrid port

port link-type hybrid

Required

Add the port to the isolate-user-VLAN and the secondary VLAN

port hyrbrid vlan vlan-id untagged

Required

Configure the default VLAN ID of the port

port hybrid pvid vlan vlan-id

Required

 

  Caution:

When you use the port hybrid pvid vlan command to configure the default VLAN ID for a port, note that you need to specify the vlan-id as a secondary VLAN for a downlink port and specify the vlan-id an isolate-user-VLAN for an uplink port.

 

2.2.5  Configuring Mapping Between Isolate-User-VLAN and Secondary VLAN

Follow these steps to establish mapping relationship between an isolate-user-VLAN and secondary VLANs:

To do…

Use the command…

Remarks

Enter system view

system-view

Configure the mapping relationship between an isolate-user-VLAN and secondary VLANs

isolate-user-vlan vlan-id secondary vlan-list

Required

 

  Caution:

An isolate-user-VLAN can establish mapping relationship with multiple secondary VLANs, however, a secondary VLAN can establish mapping relationship with only one isolate-user-VLAN.

 

2.3  Displaying Isolate-User-VLAN Configuration

To do…

Use the command…

Remarks

Display the mapping relationship between the isolate-user-VLAN and the secondary VLANs

display isolate-user-vlan [ vlan-id ]

Available any view.

 

2.4  Isolate-User-VLAN Configuration Example

2.4.1  Network requirements

l           Switch A connects with Switch B and Switch C. For Switch A, packets from Switch B and Switch C are without VLAN tag, so that Switch A needs not to consider the VLAN configurations of the lower layer switches.

l           VLAN 5 on Switch B is an isolate-user-VLAN which includes the uplink port Ethernet 1/0/1 and two secondary VLANs: VLAN 2 and VLAN 3. VLAN 3 includes port Ethernet 1/0/2, and VLAN 2 includes port Ethernet 1/0/5.

l           VLAN 6 on Switch C is an isolate-user-VLAN which includes the uplink port Ethernet 1/0/1 and two secondary VLANs: VLAN 3 and VLAN 4. VLAN 3 includes port Ethernet 1/0/3, and VLAN 4 includes port Ethernet 1/0/4.

2.4.2  Network diagram

Figure 2-2 Diagram for isolate-user-VLAN configuration

2.4.3  Configuration procedure

l           Configure Switch B

# Configure the isolate-user-VLAN

<SwitchB> system-view

[SwitchB] vlan 5

[SwitchB-vlan5] isolate-user-vlan enable

# Configure the secondary VLAN.

[SwitchB-vlan5] quit

[SwitchB] vlan 3

[SwitchB-vlan3] quit

[SwitchB] vlan 2

# Add port Ethernet 1/0/2 to the isolate-user-VLAN (VLAN 5) and the secondary VLAN (VLAN 3), and configure the port to untag the VLAN packets.

[SwitchB-vlan2] quit

[SwitchB] interface Ethernet 1/0/2

[SwitchB-Ethernet1/0/2] port link-type hybrid

[SwitchB-Ethernet1/0/2] port hybrid vlan 3 untagged

[SwitchB-Ethernet1/0/2] port hybrid vlan 5 untagged

[SwitchB-Ethernet1/0/2] port hybrid pvid vlan 3

# Add port Ethernet 1/0/5 to the isolate-user-VLAN (VLAN 5) and the secondary VLAN (VLAN 2), and configure the port to untag the VLAN packets.

[SwitchB-Ethernet1/0/2] quit

[SwitchB] interface Ethernet 1/0/5

[SwitchB-Ethernet1/0/5] port link-type hybrid

[SwitchB-Ethernet1/0/5] port hybrid vlan 2 untagged

[SwitchB-Ethernet1/0/5] port hybrid vlan 5 untagged

[SwitchB-Ethernet1/0/5] port hybrid pvid vlan 2

# Add port Ethernet 1/0/1 to the isolate-user-VLAN (VLAN 5) and the secondary VLANs (VLAN 2 and VLAN 3), and configure the port to untag the VLAN packets.

[SwitchB-Ethernet1/0/5] quit

[SwitchB] interface Ethernet 1/0/1

[SwitchB-Ethernet1/0/1] port link-type hybrid

[SwitchB-Ethernet1/0/1] port hybrid vlan 2 untagged

[SwitchB-Ethernet1/0/1] port hybrid vlan 3 untagged

[SwitchB-Ethernet1/0/1] port hybrid vlan 5 untagged

[SwitchB-Ethernet1/0/1] port hybrid pvid vlan 5

# Configure isolate-user-VLAN-to-secondary VLAN mapping.

[SwitchB-Ethernet1/0/1] quit

[SwitchB] isolate-user-vlan 5 secondary 2 to 3

l           Configure Switch C

# Configure the isolate-user-VLAN

<SwitchC> system-view

[SwitchC] vlan 6

[SwitchC-vlan6] isolate-user-vlan enable

# Configure the secondary VLAN.

[SwitchC-vlan6] quit

[SwitchC] vlan 3

[SwitchC-vlan3] vlan 4

# Add port Ethernet 1/0/3 to the isolate-user-VLAN (VLAN 6) and the secondary VLAN (VLAN 3), and configure the port to untag the VLAN packets.

[SwitchC-vlan4] quit

[SwitchC] interface Ethernet 1/0/3

[SwitchC-Ethernet1/0/3] port link-type hybrid

[SwitchC-Ethernet1/0/3] port hybrid vlan 3 untagged

[SwitchC-Ethernet1/0/3] port hybrid vlan 6 untagged

[SwitchC-Ethernet1/0/3] port hybrid pvid vlan 3

# Add port Ethernet 1/0/4 to the isolate-user-VLAN (VLAN 6) and the secondary VLAN (VLAN 4), and configure the port to untag the VLAN packets.

[SwitchC-Ethernet1/0/3] quit

[SwitchC] interface Ethernet1/0/4

[SwitchC-Ethernet1/0/4] port link-type hybrid

[SwitchC-Ethernet1/0/4] port hybrid vlan 4 untagged

[SwitchC-Ethernet1/0/4] port hybrid vlan 6 untagged

[SwitchC-Ethernet1/0/4] port hybrid pvid vlan 4

# Add port Ethernet 1/0/1 to the isolate-user-VLAN (VLAN 6) and the secondary VLANs (VLAN 3 and VLAN 4), and configure the port to untag the VLAN packets.

[SwitchC-Ethernet1/0/4] quit

[SwitchC] interface Ethernet 1/0/1

[SwitchC-Ethernet1/0/1] port link-type hybrid

[SwitchC-Ethernet1/0/1] port hybrid vlan 3 untagged

[SwitchC-Ethernet1/0/1] port hybrid vlan 4 untagged

[SwitchC-Ethernet1/0/1] port hybrid vlan 6 untagged

[SwitchC-Ethernet1/0/1] port hybrid pvid vlan 6

# Configure isolate-user-VLAN-to-secondary VLAN mapping.

[SwitchC-Ethernet1/0/1] quit

[SwitchC] isolate-user-vlan 6 secondary 3 to 4

After the above configurations, Switch A can receive packets from Switch B and Switch C, and they are all packets without VLAN tag. VLAN 3 configured on Switch B and VLAN 3 configured on Switch C cannot communicate with each other because the packets from them are untagged before the packets reach Switch A. This makes the lower switches only own locally valid VLAN configuration. And in this way, the global VLAN resource is saved.

 


Chapter 3  Super VLAN

When configuring super VLAN, go to these sections for information you are interested in:

l           Super VLAN Overview

l           Super VLAN Configuration

l           Displaying Super VLAN

l           Super VLAN Configuration Examples

 

&  Note:

Only Salience III series engines support the super VLAN.

 

3.1  Super VLAN Overview

To save IP address resources, the super VLAN concept (also known as VLAN aggregation) was developed. Its principle is like this: a super VLAN may include multiple sub VLANs, with each as a broadcast domain. Layer 2 isolation is implemented between sub VLANs. The super VLAN, but not the sub VLAN, can be configured with a Layer 3 interface,.

When users in different sub VLANs want to communicate, they use the IP address of the Layer 3 interface of the super VLAN as their gateway address. IP address resources are saved since multiple sub VLANs share one IP address.

At the same time, in order to realize the Layer 3 connectivity between the sub VLANs and between the sub VLAN and other networks, proxy ARP is used. Proxy ARP enables Layer 3 connectivity between Layer 2 isolated ports by sending ARP request and processing response packets.

3.2  Super VLAN Configuration

3.2.1  Super VLAN Configuration Task List

Complete the following tasks to configure super VLAN:

Task

Remarks

Configuring a Super VLAN

Required

Configuring a Sub VLAN

Required

Configuring the Mapping between a Super VLAN and Sub VLANs

Required

Configuring Super VLAN to Support DHCP Relay

Optional

 

3.2.2  Configuring a Super VLAN

You can configure multiple super VLANs for a switch. You can use the following commands to specify a VLAN as a super VLAN. After a VLAN is configured as a super VLAN, the configuration of its VLAN interface and IP address is the same as the configuration for an ordinary VLAN.

Follow these steps to configure a VLAN as a super VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter VLAN view

vlan vlan-id

Configure the current VLAN as a super VLAN

supervlan

Required

 

  Caution:

l      You can not configure a VLAN which includes Ethernet ports as a super VLAN; and after you configure a super VLAN, you cannot add any Ethernet port to it.

l      When a VLAN is configured as a super VLAN, proxy ARP function is automatically enabled on the VLAN interface, and cannot be disabled.

 

3.2.3  Configuring a Sub VLAN

You can configure a sub VLAN just as configuring an ordinary VLAN. See the VLAN part of this manual for details. The configuration commands are shown in the following table.

Follow these steps to configure a sub VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Create a sub VLAN

vlan vlan-id

Required

Add Ethernet port(s) to the sub VLAN

port interface-list

Required

 

  Caution:

The port command is only used to add the Access ports to a sub VLAN. If you want to add a Trunk port or a Hybrid port to a sub VLAN, you need to execute the port trunk permit vlan command and the port hybrid vlan command in Ethernet port view. Refer to the Port part of the manual.

 

Note that you can add multiple ports (except the uplink port) for a sub VLAN.

3.2.4  Configuring the Mapping between a Super VLAN and Sub VLANs

Follow these steps to configure the mapping between a super VLAN and sub VLAN(s):

To do…

Use the command…

Remarks

Enter system view

system-view

Enter VLAN view of the super VLAN

vlan vlan-id

Establish the mapping between the super VLAN and sub VLAN(s)

port interface-list

Required

 

  Caution:

l      The sub VLANs must exist before you create mapping between the sub VLANs and the super VLAN.

l      When you establish mapping between the super VLAN and the sub VLANs, if a VLAN interface is configured for the sub VLAN, the system will prompt you to delete the interface to establish the mapping successfully.

l      After establishing the mapping between the sub VLANs and the super VLAN, you can still add (or remove) ports to (from) the sub VLANs.

l      The system allows for up to 1024 sub VLANs.

 

3.2.5  Configuring Super VLAN to Support DHCP Relay

With DHCP relay function enabled on the VLAN interface of the super VLAN, the hosts of all sub VLANs that map with the super VLAN can dynamically obtain IP addresses from the outside networks.

With the DHCP relay function enabled on the VLAN interface of the super VLAN, the hosts of the sub VLANs that map the interface and the DHCP server in another network segment can forward the DHCP packets to each other, so as to assist the hosts in the sub VLANs to finish the dynamic configuration of IP address.

I. Configuration Prerequisites

l           Configure a super VLAN and sub VLANs, and establish the mapping between the super VLAN the sub VLANs.

l           Configure the IP address of the super VLAN to make the hosts in the sub VLANs be able to communicate with the outside network.

II. Configuration Procedure

To do…

Use the command…

Remarks

Enter system view

system-view

Enter VLAN interface view of the super VLAN

interface Vlan-interface vlan-id

Configure the mapping between the interface and the DHCP server group

dhcp-server groupNo

Required

By default, the VLAN interface does not establish mapping relationship with any DHCP server group.

 

&  Note:

l      A super VLAN interface can only correspond to one DHCP server group.

l      The last configuration will take effect if you execute the dhcp-server groupNo command for multiple times.

l      The DHCP server group specified by groupNo of the dhcp-server groupNo command needs to be configured first by the dhcp-server ip command in system view. Refer to the DHCP part of the manual.

 

3.3  Displaying Super VLAN

To do…

Use the command…

Remarks

Display the mapping between the super VLAN and the sub VLANs

display supervlan [ supervlan-id ]

Available in any view.

 

3.4  Super VLAN Configuration Examples

3.4.1  Super VLAN Configuration Example

I. Network Requirements

Create super VLAN 10 and sub VLANs VLAN 2, VLAN 3, VLAN 5. Configure ports Ethernet 1/0/1 and Ethernet 1/0/2 to belong to VLAN 2, Ethernet 1/0/3 and Ethernet 1/0/4 to belong to VLAN 3, and Ethernet 1/0/5 and Ethernet 1/0/6 to belong to VLAN 5. Since Layer 2 isolation is implemented between VLANs, configure Layer 3 connectivity between sub VLANs, and all sub VLANs use the Layer 3 interface of the super VLAN (with the IP address being 10.110.1.1) as the gateway to communicate with the outside.

II. Network diagram

Omitted

III. Configuration procedure

# Create VLAN 10, and enable the super VLAN function on it.

<H3C> system-view

[H3C] vlan 10

[H3C-vlan10] supervlan

# Create VLAN 2, VLAN 3, and VLAN 5, and add corresponding ports to them.

[H3C-vlan10] vlan 2

[H3C-vlan2] port Ethernet 1/0/1 Ethernet 1/0/2

[H3C-vlan2] vlan 3

[H3C-vlan3] port Ethernet 1/0/3 Ethernet 1/0/4

[H3C-vlan3] vlan 5

[H3C-vlan5] port Ethernet 1/0/5 Ethernet 1/0/6

# Configure the mapping between the super VLAN and the sub VLANs.

[H3C-vlan5] vlan 10

[H3C-vlan10] subvlan 2 3 5

# Create the Layer 3 interface of the super VLAN, and configure an IP address for it.

[H3C-vlan10] interface Vlan-interface 10

[H3C-Vlan-interface10] ip address 10.110.1.1 255.255.255.0

 

&  Note:

By default, the proxy ARP function is enabled on the VLAN interface of the super VLAN, and cannot be disabled.

 

3.4.2  Super VLAN Supporting DHCP Relay Example

I. Network requirements

l           Create VLAN 6 and configure it as a super VLAN, and create VLAN 2 and VLAN 3 as the sub VLANs which map with VLAN 6.

l           Configure the IP address of the VLAN 6 as 10.1.1.1, and the sub network mask as 255.255.255.0.

l           Enable the DHCP relay function on the VLAN interface of VLAN 6, and establish the mapping between VLAN 6 and the remote DHCP server group 2 to make the hosts in VLAN 2 and VLAN 3 be able to dynamically obtain IP addresses from the DHCP server group 2.

II. Configuration Procedure

# Create VLAN 6, and configure it as a super VLAN.

<H3C> system-view

[H3C] vlan 6

[H3C-vlan6] supervlan

# Create VLAN 2 and VLAN 3 and establish the mapping between them and VLAN 6.

[H3C-vlan6] vlan 2

[H3C-vlan2] vlan 3

[H3C-vlan3] vlan 6

[H3C-vlan6] subvlan 2 3

# Create the VLAN interface of VLAN 6, and configure an IP address for it.

[H3C-vlan6] interface Vlan-interface 6

[H3C-Vlan-interface6] ip add 10.1.1.1 255.255.255.0

# Enable the DHCP relay function on the VLAN 6 interface, that is, establish the mapping between the interface and the DHCP server group 2.

[H3C-Vlan-interface6] dhcp-server 2

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网