H3C S5500-SI Series Ethernet Switches Operation Manual(V1.01)

HomeSupportSwitchesH3C S5500 Switch SeriesConfigure & DeployConfiguration GuidesH3C S5500-SI Series Ethernet Switches Operation Manual(V1.01)
02-VLAN Configuration
Title Size Download
02-VLAN Configuration 429 KB

Table of Contents

Chapter 1 VLAN Configuration. 1-1

1.1 Introduction to VLAN. 1-1

1.1.1 VLAN Overview. 1-1

1.1.2 VLAN Fundamental 1-2

1.1.3 VLAN Classification. 1-3

1.2 Configuring Basic VLAN Attributes. 1-4

1.3 Basic VLAN Interface Configuration. 1-4

1.4 Port-Based VLAN Configuration. 1-6

1.4.1 Introduction to Port-Based VLAN. 1-6

1.4.2 Configuring an Access-Port-Based VLAN. 1-7

1.4.3 Configuring a Trunk-Port-Based VLAN. 1-8

1.4.4 Configuring a Hybrid-Port-Based VLAN. 1-9

1.5 MAC Address-Based VLAN Configuration. 1-10

1.5.1 Introduction to MAC Address-Based VLAN. 1-10

1.5.2 Configuring a MAC Address-Based VLAN. 1-11

1.6 Displaying and Maintaining VLAN. 1-12

1.7 VLAN Configuration Example. 1-13

Chapter 2 Voice VLAN Configuration. 2-1

2.1 Introduction to Voice VLAN. 2-1

2.1.1 Voice VLAN Modes on a Port 2-2

2.1.2 Security Mode and Normal Mode for the Voice VLAN. 2-4

2.2 Configuring Voice VLAN. 2-4

2.2.1 Configuration Prerequisites. 2-4

2.2.2 Configuring Voice VLAN Mode on a Port to Automatic Mode. 2-5

2.2.3 Configuring Voice VLAN Mode on a Port to Manual Mode. 2-5

2.3 Displaying and Maintaining Voice VLAN. 2-7

2.4 Voice VLAN Configuration Examples. 2-7

2.4.1 Automatic Voice VLAN Mode Configuration Example. 2-7

2.4.2 Manual Voice VLAN Mode Configuration Example. 2-9

Chapter 3 GVRP Configuration. 3-1

3.1 Introduction to GVRP. 3-1

3.1.1 GARP. 3-1

3.1.2 GVRP. 3-4

3.1.3 Protocols and Standards. 3-4

3.2 GVRP Configuration Task List 3-5

3.3 Configuring GVRP. 3-5

3.3.1 Enabling GVRP. 3-5

3.3.2 Configuring GARP Timers. 3-6

3.4 Displaying and Maintaining GVRP. 3-7

3.5 GVRP Configuration Examples. 3-7

3.5.1 GVRP Configuration Example I 3-7

3.5.2 GVRP Configuration Example II 3-9

3.5.3 GVRP Configuration Example III 3-10

 


Chapter 1  VLAN Configuration

When configuring VLAN, go to these sections for information you are interested in:

l           Introduction to VLAN

l           Configuring Basic VLAN Attributes

l           Basic VLAN Interface Configuration

l           Port-Based VLAN Configuration

l           MAC Address-Based VLAN Configuration

l           Displaying and Maintaining VLAN

l           VLAN Configuration Example

1.1  Introduction to VLAN

1.1.1  VLAN Overview

Ethernet is a network technology based on the Carrier Sense Multiple Access/Collision Detect (CSMA/CD) mechanism. As the medium is shared in an Ethernet, network performance may degrade as the number of hosts on the network is increasing. If the number of the hosts in the network reaches a certain level, problems caused by collisions, broadcasts, and so on emerge, which may cause the network operating improperly. In addition to the function that suppresses collisions (which can also be achieved by interconnecting LANs), virtual LAN (VLAN) can also isolate broadcast packets. VLAN divides a LAN into multiple logical LANs with each being a broadcast domain. Hosts in the same VLAN can communicate with each other like in a LAN. However, hosts from different VLANs cannot communicate directly. In this way, broadcast packets are confined to a single VLAN, as illustrated in the following figure.

Figure 1-1 A VLAN diagram

A VLAN is not restricted by physical factors, that is to say, hosts that reside in different network segments may belong to the same VLAN, users in a VLAN can be connected to the same switch, or span across multiple switches or routers.

VLAN technology has the following advantages:

1)         Broadcast traffic is confined to each VLAN, reducing bandwidth utilization and improving network performance.

2)         LAN security is improved. Packets in different VLANs are isolated at Layer 2. That is, users in a VLAN cannot communicate with users in other VLANs directly, unless routers or Layer 3 switches are used.

3)         A more flexible way to establish virtual workgroups. With VLAN technology, a virtual workgroup can be created spanning physical network segments. That is, users from the same workgroup do not have to be within the same physical area, making network construction and maintenance much easier and more flexible.

1.1.2  VLAN Fundamental

To enable packets being distinguished by the VLANs they belong to, The VLAN tag fields used to identify VLANs are added to packets. As common switches operate on the data link layer of the OSI model, they only process data link layer encapsulation information and the VLAN tag thus needs to be inserted to the data link layer encapsulation.

The format of the packets carrying the VLAN tag fields is defined in IEEE 802.1Q, which is issued by IEEE in 1999.

In the header of a traditional Ethernet data frame, the field following the destination MAC address and the source MAC address is the Type field, which indicates the upper layer protocol type. Figure 1-2 illustrates the format of a traditional Ethernet frame, where DA stands for destination MAC address, SA stands for source MAC address, and Type stands for the upper layer protocol type of the frame.

Figure 1-2 The format of a traditional Ethernet frame

IEEE802.1Q defines a four-byte VLAN Tag between the DA&SA field and the Type field to carry VLAN-related information, as shown in Figure 1-3.

Figure 1-3 The position and the format of the VLAN Tag

The VLAN Tag comprises four fields: the tag protocol identifier (TPID) field, the Priority field, the canonical format indicator (CFI) field, and the VLAN ID field.

l           The TPID field, 16 bits in length and with a value of 0x8100, indicates that a packet carries a VLAN tag with it.

l           The Priority field, three bits in length, indicates the 802.1p priority of a packet. For information about packet priority, refer to the QoS part of the manual.

l           The CFI field, one bit in length, specifies whether or not the MAC addresses are encapsulated in standard format when packets are transmitted across different medium. With the field set to 0, MAC addresses are encapsulated in standard format; with the field set to 1, MAC addresses are encapsulated in non-standard format. The filed is 0 by default.

l           The VLAN ID field, 12 bits in length and with its value ranging from 0 to 4095, identifies the ID of the VLAN a packet belongs to. As VLAN IDs of 0 and 4095 are reserved by the protocol, the value of this field actually ranges from 1 to 4094.

A network device determines the VLAN to which a packet belongs to by the VLAN ID field the packet carries. The VLAN Tag determines the way a packet is processed. For more information, refer to section Introduction to Port-Based VLAN.

 

&  Note:

The frame format mentioned here is that of Ethernet II. Besides Ethernet II encapsulation, other types of encapsulation, including 802.2 LLC, 802.2 SNAP, and 802.3 raw are also supported by Ethernet. The VLAN tag fields are also added to packets adopting these encapsulation formats for VLAN identification.

 

1.1.3  VLAN Classification

Based on how VLANs are established, VLANs fall into different categories. The following types are the most commonly used:

l           Port-based

l           MAC address-based

l           Protocol-based

l           IP-subnet-based

l           Policy-based

l           Other types

The S5500-SI series Ethernet switches support port-based VLAN and MAC address-based VLAN.

1.2  Configuring Basic VLAN Attributes

Follow these steps to configure basic VLAN attributes:

To do…

Use the command…

Remarks

Enter system view

system-view

Create VLANs

vlan { vlan-id1 [ to vlan-id2 ] | all }

Optional

Using this command can create multiple VLANs in a bulk.

Enter VLAN view

vlan vlan-id

Required

If the specified VLAN does not exist, the command creates the VLAN and then enters its view.

By default, only the default VLAN (that is, VLAN 1) exists in the system.

Specify a descriptive string for the VLAN

description text

Optional

VLAN ID used by default, for example, “VLAN 0001”

 

&  Note:

l      As the default VLAN, VLAN 1 cannot be created or removed.

l      You cannot manually create or remove reserved VLANs, which are reserved for specific functions.

l      Dynamic VLANs cannot be removed using the undo vlan command.

l      If a VLAN has a QoS policy configured, the VLAN cannot be removed.

l      If a VLAN is configured as a remote-probe VLAN for remote port mirroring, it cannot be removed using the undo vlan command unless its remote-probe VLAN configuration is removed.

 

1.3  Basic VLAN Interface Configuration

Hosts of different VLANs cannot communicate directly. That is, routers or Layer 3 switches are needed for packets to travel across different VLANs. VLAN interfaces are used to forward VLAN packets on Layer 3.

VLAN interfaces are Layer 3 virtual interfaces (which do not exist physically on devices) used for Layer 3 interoperability between different VLANs. Each VLAN can have one VLAN interface. Packets of a VLAN can be forwarded on network layer through the corresponding VLAN interface. As each VLAN forms a broadcast domain, a VLAN can be an IP network segment and the VLAN interface can be the gateway to enable IP address-based Layer 3 forwarding.

Follow these steps to configure VLAN interface basic attributes:

To do…

Use the command…

Remarks

Enter system view

system-view

Create a VLAN interface or enter VLAN interface view

interface Vlan-interface vlan-interface-id

Required

This command leads you to VLAN interface view if the VLAN interface already exists.

Configure an IP address for the VLAN interface

ip address ip-address { mask | mask-length } [ sub ]

Optional

Not configured by default

Specify the descriptive string for the VLAN interface

description text

Optional

VLAN interface name is used by default, for example, “Vlan-interface1 Interface”.

Bring up the VLAN interface

undo shutdown

Optional

By default, a VLAN interface is up. The state of a VLAN interface also depends on the states of the ports in the VLAN. If all the ports in the VLAN are down, the VLAN interface is down; if one or more ports in the VLAN are up, the VLAN interface is up.

If a VLAN interface is manually shut down, the VLAN interface is always down regardless of the states of ports in the VLAN.

 

&  Note:

Before creating a VLAN interface, ensure that the corresponding VLAN already exists. Otherwise, the specified VLAN interface will not be created.

 

1.4  Port-Based VLAN Configuration

1.4.1  Introduction to Port-Based VLAN

This is the simplest and yet the most effective way of classifying VLANs. It groups VLAN members by port. After added to a VLAN, a port can forward the packets of the VLAN.

I. Port link type

Based on the tag handling mode, a port’s link type can be one of the following three:

l           Access port: the port only belongs to one VLAN, normally used to connect user device;

l           Trunk port: the port can belong to multiple VLANs, can receive/send packets for multiple VLANs, normally used to connect network devices;

l           Hybrid port: the port can belong to multiple VLANs, can receive or send packets for multiple VLANs, used to connect either user or network devices;

The differences between Hybrid and Trunk port:

l           A Hybrid port allows packets of multiple VLANs to be sent without the Tag label;

l           A Trunk port only allows packets from the default VLAN to be sent without the Tag label.

II. Default VLAN

You can configure the default VLAN for a port. By default, VLAN 1 is the default VLAN for all ports. However, this can be changed as needed.

l           An Access port only belongs to one VLAN. Therefore, its default VLAN is the VLAN it resides in and cannot be configured.

l           You can configure the default VLAN for the Trunk port or the Hybrid port as they can both belong to multiple VLANs.

l           After deletion of the default VLAN using the undo vlan command, the default VLAN for an Access port will revert to VLAN 1, whereas that for the Trunk or Hybrid port remains, meaning the port can use a nonexistent VLAN as the default VLAN.

 

&  Note:

For a port in automatic voice VLAN mode, do not set the voice VLAN as the default VLAN of the port. Otherwise, the system prompts error information. For information about voice VLAN, refer to Voice VLAN Configuration.

 

Configured with the default VLAN, a port handles packets in the following ways:

Port type

Inbound packets handling

Outbound packets handling

If no tag is carried in the packet

If a tag is carried in the packet

Access Port

Tag the packet with the default VLAN ID

l      Receive the packet if its VLAN ID is the same as the default VLAN ID

l      Discard the packet if its VLAN ID is different from the default VLAN ID

Strip the Tag and send the packet as the VLAN ID is the same with the default VLAN ID

Trunk port

Check whether the default VLAN ID of the port is in the list of VLANs allowed to pass through the port, if yes, tag the packet with the default VLAN ID; if no, discard the packet

l      Receive the packet if the VLAN ID is in the list of VLANs allowed to pass through the port

l      Discard the packet if the VLAN ID is not in the list of VLANs allowed to pass through the port

l      Strip the tag and send the packet if the VLAN ID is the same as the default VLAN ID

l      Keep the tag and send the packet if the VLAN ID is not the same as the default VLAN ID but allowed to pass through the port

Hybrid port

Send the packet if the VLAN ID is allowed to pass through the port. Use the port hybrid vlan command to configure whether the port keeps or strips the tags when sending packets of a VLAN (including the default VLAN).

 

1.4.2  Configuring an Access-Port-Based VLAN

There are two ways to configure Access-port-based VLAN: one way is to configure in VLAN view, the other way is to configure in Ethernet port view/port group view.

Follow these steps to configure the Access-port-based VLAN in VLAN view:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter VLAN view

vlan vlan-id

Required

If the specified VLAN does not exist, this command be created first creates the VLAN before entering its view.

Add an Access port to the current VLAN

port interface-list

Required

By default, system will add all ports to VLAN 1.

 

Follow these steps to configure the Access-port-based VLAN in Ethernet port view/port group view:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet port view or port group view

Enter Ethernet port view

interface interface-type interface-number

Use either command

In Ethernet port view, the subsequent configurations only apply to the current port; In port group view, the subsequent configurations apply to all ports in the port group.

Enter port group view

port-group { manual port-group-name | aggregation agg-id }

Configure the port link type as Access

port link-type access

Optional

The link type of a port is Access by default.

Add the current Access port to a specified VLAN

port access vlan vlan-id

Optional

By default, all Access ports belong to VLAN 1.

 

&  Note:

To add an Access port to a VLAN, make sure the VLAN already exists.

 

1.4.3  Configuring a Trunk-Port-Based VLAN

A Trunk port may belong to multiple VLANs, and you can only perform this configuration in Ethernet port view or port group view.

Follow these steps to configure the Trunk-port-based VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet port view or port group view

Enter Ethernet port view

interface interface-type interface-number

Use either command

In Ethernet port view, the subsequent configurations only apply to the current port; in port group view, the subsequent configurations apply to all ports in the port group.

Enter port group view

port-group { manual port-group-name | aggregation agg-id }

Configure the port link type as Trunk

port link-type trunk

Required

Allow the specified VLANs to pass through the current Trunk port

port trunk permit vlan { vlan-id-list | all }

Required

By default, all Trunk ports only allow packets of VLAN 1 to pass.

Configure the default VLAN for the Trunk port

port trunk pvid vlan vlan-id

Optional

VLAN 1 is the default by default.

 

&  Note:

l      To convert a Trunk port into a Hybrid port (or vice versa), you need to use the Access port as a medium. For example, the Trunk port has to be configured as an Access port first and then a Hybrid port.

l      The default VLAN IDs of the Trunk ports on the local and peer devices must be the same. Otherwise, packets cannot be transmitted properly.

 

1.4.4  Configuring a Hybrid-Port-Based VLAN

A Hybrid port may belong to multiple VLANs, and this configuration can only be performed in Ethernet port view or port group view.

Follow these steps to configure the Hybrid-port-based VLAN:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet port view or port group view

Enter Ethernet port view

interface interface-type interface-number

Use either command;

In Ethernet port view, the subsequent configurations only apply to the current port; in port group view, the subsequent configurations apply to all ports in the port group

Enter port group view

port-group { manual port-group-name | aggregation agg-id }

Configure the port link type as Hybrid

port link-type hybrid

Required

Allow the specified VLANs to pass through the current Hybrid port

port hybrid vlan vlan-id-list { tagged | untagged }

Required

By default, all Hybrid ports only allow packets of VLAN 1 to pass.

Configure the default VLAN of the Hybrid port

port hybrid pvid vlan vlan-id

Optional

VLAN 1 is the default by default

 

&  Note:

l      To configure a Trunk port into a Hybrid port (or vice versa), you need to use the Access port as a medium. For example, the Trunk port has to be configured as an Access port first and then a Hybrid port.

l      Ensure that the VLANs already exist before configuring them to pass through a Hybrid port.

l      The default VLAN IDs of the Hybrid ports on the local and the peer devices must be the same. Otherwise, packets cannot be transmitted properly.

 

1.5  MAC Address-Based VLAN Configuration

1.5.1  Introduction to MAC Address-Based VLAN

With MAC address-based VLANs created, the VLAN to which a packet belongs is determined by its source MAC address, and packets in a MAC address-based VLAN are forwarded after being tagged with the tag of the VLAN. This function is usually coupled with the security technologies (such as 802.1X) to provide secure and flexible network accesses for terminal devices.

I. MAC address-based VLAN implementation

With MAC address-based VLANs created on a port, the port operates as follows:

l           If an untagged packet is received, the port checks its MAC address VLAN entries for the one that matches the source MAC address of the packet. If the entry exists, the packet is forwarded based on the matched VLAN ID and the precedence value; otherwise, the packet is forwarded based on the default VLAN of the port.

l           If a tagged packet is received, the port processes the packet in the same way as it processes port-based VLAN packets, that is, forwards the packet if the VLAN corresponding to the VLAN tag is permitted by the port or drops the packet if the VLAN corresponding to the VLAN tag is not permitted by the port.

II. The ways to create MAC address-based VLANs

A MAC address-based VLAN can be created in one of the following two ways.

l           Static configuration (through CLI)

You can associate MAC addresses and VLANs by using corresponding commands.

l           Auto configuration though the authentication server (that is, VLAN issuing)

The device associates MAC addresses and VLANs dynamically based on the information provided by the authentication server. If a user goes offline, the corresponding MAC address-to-VLAN association is removed automatically. Auto configuration requires MAC address-to–VLAN mapping relationship be configured on the authentication server. For detailed information, refer to 802.1x-HABP-MAC Authentication Configuration.

The two configuration methods can be used at the same time, that is, you can configure a MAC address-to-VLAN entry on both the local device and the authentication serer at the same time. Note that the MAC address-to-VLAN entry configuration takes effect only when the configuration on the local device is consistent with that on the authentication server.

1.5.2  Configuring a MAC Address-Based VLAN

 

&  Note:

MAC address-based VLANs are available only on Hybrid ports.

 

Follow these steps to configure a MAC address-based VLAN:

To do...

Use the  command...

Remarks

Enter system view

system-view

Associate MAC addresses with a VLAN

mac-vlan mac-address mac-addr vlan vlan-id [ priority priority ]

Required

Enter Ethernet interface view or port group view

Enter Ethernet interface view

interface interface-type interface-number

Use either command.

The configuration performed in Ethernet interface view applies to the current port only; the configuration performed in port group view applies to all the ports in the port group.

Enter port group view

port-group { manual port-group-name | aggregation agg-id }

Configure the link type of the port(s) as hybrid

port link-type hybrid

Required

Configure the current hybrid port(s) to permit packets of specific MAC address-based VLANs

port hybrid vlan vlan-id-list { tagged | untagged }

Required

By default, a hybrid port only permits the packets of VLAN 1.

Enable MAC address-based VLAN

mac-vlan enable

Required

Disabled by default

 

1.6  Displaying and Maintaining VLAN

To do...

Use the command…

Remarks

Display the information about specific VLANs

display vlan [ vlan-id1 [ to vlan-id2 ] | all | dynamic | reserved | static ]

Available in any view

Display the information about a VLAN interface

display interface Vlan-interface [ vlan-interface-id ]

Available in any view

Display all the ports with MAC address-based VLAN enabled.

display mac-vlan interface

Available in any view

Display the information about specific MAC address-to-VLAN entries

display mac-vlan { all | dynamic | mac-address mac-addr | static | vlan vlan-id }

Available in any view

Clear the statistics on a VLAN interface

reset counters interface Vlan-interface [ vlan-interface-id ]

Available in user view

 

1.7  VLAN Configuration Example

I. Network requirements

l           Device A connects to Device B through Trunk port GigabitEthernet 1/0/1;

l           The default VLAN ID of the port is 100;

l           This port allows packets from VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 to pass through.

II. Network diagram

Figure 1-4 Network diagram for port-based VLAN configuration

III. Configuration procedure

1)         Configure Device A

# Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100.

<DeviceA> system-view

[DeviceA] vlan 2

[DeviceA-vlan2] quit

[DeviceA] vlan 100

[DeviceA-vlan100] vlan 6 to 50

Please wait... Done. 

# Enter GigabitEthernet 1/0/1 port view.

[DeviceA] interface GigabitEthernet 1/0/1

# Configure GigabitEthernet 1/0/1 as a Trunk port and configure its default VLAN ID as 100.

[DeviceA-GigabitEthernet1/0/1] port link-type trunk

[DeviceA-GigabitEthernet1/0/1] port trunk pvid vlan 100

# Configure GigabitEthernet 1/0/1 to deny the packets of VLAN 1 (by default, the packets of VLAN 1 are permitted on all the ports).

[DeviceA-GigabitEthernet1/0/1] undo port trunk permit vlan 1

# Configure packets from VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 to pass through GigabitEthernet 1/0/1.

[DeviceA-GigabitEthernet1/0/1] port trunk permit vlan 2 6 to 50 100

Please wait... Done.

2)         Configure Device B following similar steps as that of Device A.

IV. Verification

Verifying the configuration of Device A is similar to that of Device B. So only Device A is taken for example here.

# Display the information about GigabitEthernet 1/0/1 of Device A to verify the above configurations.

<DeviceA> display interface GigabitEthernet 1/0/1

GigabitEthernet1/0/1 current state: UP

 IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 0011-2233-5577

 Description: GigabitEthernet1/0/1 Interface

 Loopback is not set

 Media type is twisted pair

 Port hardware type is  1000_BASE_T

 1000Mbps-speed mode, full-duplex mode

 Link speed type is autonegotiation, link duplex type is autonegotiation

 Flow-control is not enabled

 The Maximum Frame Length is 9212

 Broadcast MAX-ratio: 100%

 Unicast MAX-ratio: 100%

 Multicast MAX-ratio: 100%

 Allow jumbo frame to pass

 PVID: 100

 Mdi type: auto

 Link delay is 0(sec)

 Port link-type: trunk

  Tagged   VLAN ID : 2, 6-50, 100

  Untagged VLAN ID : 2, 6-50, 100

 Port priority: 0

 Last 300 seconds input:  8 packets/sec 1513 bytes/sec   0%

 Last 300 seconds output:  1 packets/sec 179 bytes/sec   0%

 Input (total):  25504971 packets, 13911485028 bytes

          14288575 broadcasts, 11111535 multicasts

 Input (normal):  25504971 packets, - bytes

          14288575 broadcasts, 11111535 multicasts

 Input:  0 input errors, 0 runts, 0 giants, 0 throttles

          0 CRC, 0 frame, - overruns, 0 aborts

          - ignored, - parity errors

 Output (total): 175995 packets, 31290143 bytes

          47 broadcasts, 68494 multicasts, 0 pauses

 Output (normal): 175995 packets, - bytes

          47 broadcasts, 68494 multicasts, 0 pauses

 Output: 0 output errors, - underruns, - buffer failures

          0 aborts, 0 deferred, 0 collisions, 0 late collisions

          0 lost carrier, - no carrier         

The output above shows that:

l           The port is a Trunk port (Port link-type: trunk).

l           The default VLAN is VLAN 100 (PVID: 100).

l           The port permits packets of VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 (VLAN permitted: 2, 6-50, 100).

So the configuration is successful.

 


Chapter 2  Voice VLAN Configuration

When configuring Voice VLAN, go to these sections for information you are interested in:

l           Introduction to Voice VLAN

l           Configuring Voice VLAN

l           Displaying and Maintaining Voice VLAN

l           Voice VLAN Configuration

2.1  Introduction to Voice VLAN

A voice VLAN is configured specially for voice traffic. By adding the ports that connect voice devices to the voice VLAN, you can configure quality of service (QOS for short) attributes for the voice traffic, improving transmission priority and ensuring voice quality. A device determines whether a received packet is a voice packet by checking its source MAC address. Packets containing source MAC addresses that comply with the voice device Organizationally Unique Identifier (OUI for short) addresses are regarded as voice traffic, and are forwarded to the voice VLAN.

You can configure the OUI addresses in advance or use the default OUI addresses, which are listed as follows.

Table 2-1 The default OUI addresses of different vendors

Number

OUI address

Vendors

1

0001-e300-0000

Siemens phone

2

0003-6b00-0000

Cisco phone

3

0004-0d00-0000

Avaya phone

4

0060-b900-0000

Philips/NEC phone

5

00d0-1e00-0000

Pingtel phone

6

00e0-7500-0000

Polycom phone

7

00e0-bb00-0000

3Com phone

 

&  Note:

l      As the first 24 bits of a MAC address (in binary format), an OUI address is a globally unique identifier assigned to a vendor by IEEE (Institute of Electrical and Electronics Engineers).

l      You can add or remove default OUI address manually.

 

2.1.1  Voice VLAN Modes on a Port

There are two voice VLAN modes on a port: automatic and manual (the mode here refers to the way of adding a port to a voice VLAN).

l           In automatic mode, the system identifies the source MAC address contained in the protocol packets (untagged packets) sent when the IP phone is powered on and matches it against the OUI addresses. If a match is found, the system will automatically add the port into the Voice VLAN and apply ACL rules and configure the packet precedence. An aging time can be configured for the voice VLAN. The system will remove a port from the voice VLAN if no voice packet is received from it after the aging time. The adding and removing of ports are automatically realized by the system.

l           In manual mode, administrators add the IP phone access port to the voice VLAN manually. It then identifies the source MAC address contained in the packet, matches it against the OUI addresses. If a match is found, the system issues ACL rules and configures the precedence for the packets. In this mode, the operation of adding ports to and removing ports from the voice VLAN are carried out by the administrators.

l           Both modes forward tagged packets according to their tags.

The following table lists the co-relation between the port voice VLAN mode, the voice traffic type of an IP phone, and the port link type.

Table 2-2 Voice VLAN operating mode and the corresponding voice traffic types

Port voice VLAN mode

Voice traffic type

Port link type

Automatic mode

Tagged voice traffic

Access: not supported

Trunk: supported provided that the default VLAN of the access port exists and is not the voice VLAN and that the access port belongs to the voice VLAN

Hybrid: supported provided that the default VLAN of the access port exists and is not the voice VLAN, and is in the list of tagged VLANs whose packets can pass through the access port

Untagged voice traffic

Access, Trunk, Hybrid: not supported

Manual mode

Tagged voice traffic

Access: not supported

Trunk: supported provided that the default VLAN of the access port exists and is not the voice VLAN and that the access port belongs to the default VLAN

Hybrid: supported provided that the default VLAN of the access port exists and is not the voice VLAN, and is in the list of tagged VLANs whose packets can pass through the access port

 Untagged voice traffic

Access: supported provided that the default VLAN of the access port is the voice VLAN

Trunk: supported provided that the default VLAN of the access port is the voice VLAN and that the access port allows packets from the voice VLAN to pass through

Hybrid port: supported provided that the default VLAN of the access port is the voice VLAN and is in the list of untagged VLANs whose packets are allowed to pass through the access port

 

  Caution:

If the voice traffic sent by an IP phone is tagged and that the access port has 802.1x authentication and Guest VLAN enabled, assign different VLAN IDs for the voice VLAN, the default VLAN of the access port, and the 802.1x guest VLAN.

 

&  Note:

l      The default VLAN for all ports is VLAN 1. Using commands, users can either configure the default VLAN of a port, or configure to allow a certain VLAN to pass through the port. For more information, refer to section Port-Based VLAN Configuration.

l      Use the display interface command to display the default VLAN and the VLANs that are allowed to go through a certain port.

 

2.1.2  Security Mode and Normal Mode for the Voice VLAN

Voice VLAN modes fall into security mode and normal mode based on the filtering mechanisms of the voice VLAN-enabled ports on the inbound packets. In the two modes, the voice VLAN-enabled ports process untagged packets and packets with the voice VLAN tags in different ways, as shown in the following table:

Voice VLAN mode

Inbound packet type

Processing way

Security mode

Untagged packets

If the source MAC addresses of the packets are OUI addresses that can be identified by the system, send the packets to the voice VLAN; otherwise, discard the packets.

Packets with the voice VLAN tag

Normal mode

Untagged packets

The packet source MAC address will not be checked, and all packets can be transmitted in the voice VLAN.

Packets with the voice VLAN tag

 

In the two modes, the port processes a packet with other VLAN tag in the same way, that is, forwards the packet if the VLAN is allowed on the port, or discards the packet if the VLAN is not allowed on the port.

It is recommended that you do not mix voice packets with other types of data in a voice VLAN. If necessary, please ensure that the security mode is disabled.

2.2  Configuring Voice VLAN

2.2.1  Configuration Prerequisites

l           Create the corresponding VLAN before configuring the voice VLAN;

l           As a default VLAN, VLAN 1 does not need to be created. However, it cannot be enabled with the voice VLAN feature.

2.2.2  Configuring Voice VLAN Mode on a Port to Automatic Mode

Follow these steps to set the port voice VLAN mode to automatic:

To do...

Use the command...

Remarks

Enter system view

system-view

Configure the aging time of the voice VLAN

voice vlan aging minutes

Optional

Only applicable to ports in automatic mode and defaults to 1,440 minutes

Enable the security mode for the voice VLAN

voice vlan security enable

Optional

Enabled by default

Configure the OUI address for the voice VLAN

voice vlan mac-address oui mask oui-mask [ description text ]

Optional

By default, each voice VLAN has default OUI addresses configured. Refer to Table 2-1 for the default OUI addresses of different vendors.

Enable the voice VLAN feature globally

voice vlan vlan-id enable

Required

Enter Ethernet port view

interface interface-type interface-number

Configure the port voice VLAN mode as automatic

voice vlan mode auto

Optional

Automatic mode by default

Different voice VLAN modes can be configured on different ports, independent of one another.

Enable the voice VLAN feature on the port

voice vlan enable

Required

Not enabled by default

 

&  Note:

The default VLAN of a port in automatic mode cannot be configured as the voice VLAN. Otherwise, the system will prompt error information.

 

2.2.3  Configuring Voice VLAN Mode on a Port to Manual Mode

Follow these steps to set the port voice VLAN mode to manual:

To do...

Use the command...

Remarks

Enter system view

system-view

Enable the security mode of a voice VLAN

voice vlan security enable

Optional

Enabled by default

Configure the OUI address of a voice VLAN

voice vlan mac-address oui mask oui-mask [ description text ]

Optional

By default, each voice VLAN has default OUI addresses configured. Refer to Table 2-1 for the default OUI addresses of different vendors.

Enable the voice VLAN feature globally

voice vlan vlan-id enable

Required

Enter Ethernet port view

interface interface-type interface-number

Configure the working mode as manual

undo voice vlan mode auto

Required

Disabled by default

Add the ports in manual mode to the voice VLAN

Access port

Refer to Configuring an Access-Port-Based VLAN.

Use one of the three approaches.

After you add an Access port to the voice VLAN, the voice VLAN becomes the default VLAN of the port automatically.

Trunk port

Refer to Configuring a Trunk-Port-Based VLAN.

Hybrid port

Refer to Configuring a Hybrid-Port-Based VLAN.

Configure the  voice VLAN as the default VLAN of the port

Trunk port

Refer to section Configuring a Trunk-Port-Based VLAN

Optional

This operation is required if the inbound voice traffic is untagged. If the inbound voice traffic is tagged, do not configure the voice VLAN as the default VLAN of the port.

Hybrid port

Refer to Configuring a Hybrid-Port-Based VLAN.

Enable the voice VLAN feature on the port

voice vlan enable

Required

 

&  Note:

l      Only one VLAN of a device can have the voice VLAN function enabled at a time, and the VLAN must be an exsiting static VLAN.

l      A port that is in a link aggregation port group cannot have the voice VLAN feature enabled.

l      If a port is enabled with voice VLAN and works in the manual voice VLAN mode, you need to add the port to the voice VLAN manually to make the voice VLAN takes effect on the port.

 

2.3  Displaying and Maintaining Voice VLAN

To do...

Use the command...

Remarks

Display the voice VLAN state

display voice vlan state

Available in any view

Display the OUI addresses currently supported by system

display voice vlan oui

Available in any view

 

2.4  Voice VLAN Configuration Examples

2.4.1  Automatic Voice VLAN Mode Configuration Example

I. Network requirement

l           Create VLAN 2 and configure it as a voice VLAN with an aging time of 100 minutes.

l           The voice traffic sent by the IP phones is tagged. Configure GigabitEthernet 1/0/1 as a Hybrid port and as the access port, with VLAN 6 as the default VLAN.

l           The device allows voice packets from GigabitEthernet 1/0/1 with an OUI address of 0011-2200-0000 and a mask of ffff-ff00-0000 to be forwarded through the voice VLAN.

II. Network diagram

Figure 2-1 Network diagram for automatic voice VLAN mode configuration

III. Configuration procedure

 # Create VLAN 2 and VLAN 6.

<DeviceA> system-view

[DeviceA] vlan 2

[DeviceA-vlan2] quit

[DeviceA] vlan 6

[DeviceA-vlan6] quit

# Configure the voice VLAN aging time.

[DeviceA] voice vlan aging 100

# Configure the OUI address 0011-2200-0000 as the legal address of the voice VLAN.

[DeviceA] voice vlan mac-address 0011-2200-0000 mask ffff-ff00-0000

# Enable the voice VLAN feature globally.

[DeviceA] voice vlan 2 enable

# Configure the voice VLAN mode on GigabitEthernet 1/0/1 as automatic. (Optional, by default, the voice VLAN mode on a port is automatic mode)

[DeviceA] interface GigabitEthernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] voice vlan mode auto

# Configure GigabitEthernet 1/0/1 as a Hybrid port.

[DeviceA-GigabitEthernet1/0/1] port link-type access

 Please wait... Done.

[DeviceA-GigabitEthernet1/0/1] port link-type hybrid

# Configure the default VLAN of the port as VLAN 6 and allow packets from VLAN 6 to pass through the port.

[DeviceA-GigabitEthernet1/0/1] port hybrid pvid vlan 6

[DeviceA-GigabitEthernet1/0/1] port hybrid vlan 6 tagged

# Enable the voice VLAN feature on the port.

[DeviceA-GigabitEthernet1/0/1] voice vlan enable

[DeviceA-GigabitEthernet1/0/1] return

IV. Verification

# Display information about the OUI addresses, OUI address masks, and descriptive strings.

<DeviceA> display voice vlan oui

Oui Address     Mask            Description

0001-e300-0000  ffff-ff00-0000  Siemens phone

0003-6b00-0000  ffff-ff00-0000  Cisco phone

0004-0d00-0000  ffff-ff00-0000  Avaya phone

0011-2200-0000  ffff-ff00-0000 

0060-b900-0000  ffff-ff00-0000  Philips/NEC phone

00d0-1e00-0000  ffff-ff00-0000  Pingtel phone

00e0-7500-0000  ffff-ff00-0000  Polycom phone

00e0-bb00-0000  ffff-ff00-0000  3com phone

# Display the current Voice VLAN state.

<DeviceA> display voice vlan state

Voice VLAN status: ENABLE

 Voice VLAN ID: 2

 Voice VLAN security mode: Security

 Voice VLAN aging time: 100 minutes

 Voice VLAN enabled port and its mode:

 PORT                     MODE

 --------------------------------

 GigabitEthernet1/0/1     AUTO

 

<DeviceA>

2.4.2  Manual Voice VLAN Mode Configuration Example

I. Network requirement

l           Create VLAN 2 and configure it as a voice VLAN.

l           The voice traffic sent by the IP phones is untagged. Configure GigabitEthernet 1/0/1 as a Hybrid port and as the access port.

l           GigabitEthernet 1/0/1 works in manual mode. It only allows voice packets with an OUI address of 0011-2200-0000, a mask of ffff-ff00-0000, and a descriptive string of test to be forwarded through the voice VLAN.

II. Network diagram

Figure 2-2 Network diagram for manual voice VLAN mode configuration

III. Configuration procedure

# Configure the voice VLAN to work in security mode and only allows legal voice packets to pass through the voice VLAN enabled port. (Optional, enabled by default)

<DeviceA> system-view

[DeviceA] voice vlan security enable

# Configure the OUI address 0011-2200-0000 as the legal voice VLAN address.

[DeviceA] voice vlan mac-address 0011-2200-0000 mask ffff-ff00-0000 description test

# Create VLAN 2. Enable voice VLAN feature for it.

[DeviceA] vlan 2

[DeviceA-vlan2] quit

[DeviceA] voice vlan 2 enable

# Configure GigabitEthernet 1/0/1 to work in manual mode.

[DeviceA] interface GigabitEthernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] undo voice vlan mode auto

# Configure GigabitEthernet 1/0/1 as a Hybrid port.

[DeviceA-GigabitEthernet1/0/1]port link-type access

 Please wait... Done.

[DeviceA-GigabitEthernet1/0/1]port link-type hybrid

# Configure the default VLAN of GigabitEthernet 1/0/1 as voice VLAN and add the voice VLAN to the list of tagged VLANs whose packets can pass through the port.

[DeviceA-GigabitEthernet1/0/1] port hybrid pvid vlan 2

[DeviceA-GigabitEthernet1/0/1] port hybrid vlan 2 untagged

# Enable the voice VLAN feature of GigabitEthernet 1/0/1.

[DeviceA-GigabitEthernet1/0/1] voice vlan enable

IV. Verification

# Display information about the OUI addresses, OUI address masks, and descriptive strings.

<DeviceA> display voice vlan oui

Oui Address     Mask            Description

0001-e300-0000  ffff-ff00-0000  Siemens phone

0003-6b00-0000  ffff-ff00-0000  Cisco phone

0004-0d00-0000  ffff-ff00-0000  Avaya phone

0011-2200-0000  ffff-ff00-0000  test

0060-b900-0000  ffff-ff00-0000  Philips/NEC phone

00d0-1e00-0000  ffff-ff00-0000  Pingtel phone

00e0-7500-0000  ffff-ff00-0000  Polycom phone

00e0-bb00-0000  ffff-ff00-0000  3com phone

# Display the current voice VLAN state.

<DeviceA> display voice vlan state

Voice VLAN status: ENABLE

Voice VLAN ID: 2

Voice VLAN security mode: Security

Voice VLAN aging time: 100 minutes

Voice VLAN enabled port and its mode:

PORT                  MODE

--------------------------------

GigabitEthernet1/0/1   MANUAL

 


Chapter 3  GVRP Configuration

GARP VLAN Registration Protocol (GVRP) is a GARP application. It functions based on the operating mechanism of GARP to maintain and propagate dynamic VLAN registration information for the GVRP devices on the network.

When configuring GVRP, go to these sections for information you are interested in:

l           Introduction to GVRP

l           GVRP Configuration Task List

l           Configuring GVRP

l           Displaying and Maintaining GVRP

l           GVRP Configuration Examples

3.1  Introduction to GVRP

3.1.1  GARP

Generic Attribute Registration Protocol (GARP) provides a mechanism that allows participants in a GARP application to distribute, propagate, and register with other participants in a bridged LAN the attributes specific to the GARP application, such as the VLAN or multicast address attribute.

GARP itself does not exist on a device as an entity. GARP-compliant participants are known as GARP applications. One example is GVRP. When a GARP participant is present on a port on your device, the port is regarded as a GARP participant.

I. GARP messages and timers

1)         GARP messages

GARP participants exchange information through the following three types of messages: Join message, Leave message, and LeaveAll message.

l           A GARP participant uses Join messages to have its attributes registered on other devices. A GARP participant also sends Join messages to register attributes on other GARP participants when it receives Join messages from other GARP participants or static attributes are configured on it.

l           A GARP participant uses Leave messages to have its attributes deregistered on other devices. A GARP participant also sends Leave messages when it receives Leave messages from other GARP participants or static attributes are deregistered on it.

l           LeaveAll messages are used to deregister all the attributes, through which all the other GARP participants begin to have all their attributes registered. A GARP participant sends LeaveAll messages upon the expiration of the LeaveAll timer, which is triggered when the GARP participant is created.

Join messages, Leave messages, and LeaveAll message make sure the reregistration and deregistration of GARP attributes are performed in an orderly way.

Through message exchange, all attribute information that needs registration propagates to all GARP participants throughout a LAN.

2)         GARP timers

The interval of sending of GARP messages is controlled by the following four timers:

l           Hold timer –– A GARP participant usually does not forwards a received registration request immediately after it receives a registration request, instead, it waits for the expiration of the hold timer. That is, a GARP participant sends Join messages when the hold timer expires. The Join message contains all the registration information received during the latest Hold timer cycle. Such a mechanism saves the bandwidth.

l           Join timer –– Each GARP participant sends a Join message twice for reliability sake and uses a join timer to set the sending interval. If the first Join message is not acknowledged after the interval defined by the Join timer, the GARP participant sends the second Join message.

l           Leave timer –– Starts upon receipt of a Leave message sent for deregistering some attribute information. If no Join message is received before this timer expires, the GARP participant removes the attribute information as requested.

l           LeaveAll timer –– Starts when a GARP participant starts. When this timer expires, the entity sends a LeaveAll message so that other participants can re-register its attribute information. Then, a LeaveAll timer starts again.

 

&  Note:

l      The settings of GARP timers apply to all GARP applications, such as GVRP, on a LAN.

l      Unlike other three timers, which are set on a port basis, the LeaveAll timer is set in system view and takes effect globally.

l      A GARP participant may send LeaveAll messages at the interval set by its LeaveAll timer or the LeaveAll timer on another device on the network, whichever is smaller. This is because each time a device on the network receives a LeaveAll message it resets its LeaveAll timer.

 

II. Operating mechanism of GARP

The GARP mechanism allows the configuration of a GARP participant to propagate throughout a LAN quickly. In GARP, a GARP participant registers or deregisters its attributes with other participants by making or withdrawing declarations of attributes and at the same time, based on received declarations or withdrawals, handles attributes of other participants. When a port receives an attribute declaration, it registers the attribute; when a port receives an attribute withdrawal, it deregisters the attribute.

GARP participants send protocol data units (PDU) with a particular multicast MAC address as destination. Based on this address, a device can identify to which GVRP application, GVRP for example, should a GARP PDU be delivered.

III. GARP message format

The following figure illustrates the GARP message format.

Figure 3-1 GARP message format

Table 3-1 describes the GARP message fields.

Table 3-1 Description on the GARP message fields

Field

Description

Value

Protocol ID

Protocol identifier for GARP

1

Message

One or multiple messages, each containing an attribute type and an attribute list

––

Attribute Type

Defined by the concerned GARP application

0x01 for GVRP, indicating the VLAN ID attribute

Attribute List

Contains one or multiple attributes

––

Attribute

Consists of an Attribute Length, an Attribute Event, and an Attribute Value

––

Attribute Length

Number of octets occupied by an attribute, inclusive of the attribute length field

2 to 255 (in bytes)

Attribute Event

Event described by the attribute

0: LeaveAll event

1: JoinEmpty event

2: JoinIn event

3: LeaveEmpty event

4: LeaveIn event

5: Empty event

Attribute Value

Attribute value

VLAN ID for GVRP

If the Attribute Event is LeaveAll, Attribute Value is omitted.

End Mark

Indicates the end of a GARP PDU

0x00

 

3.1.2  GVRP

GVRP enables a device to propagate local VLAN registration information to other participant devices and dynamically update the VLAN registration information from other devices to its local database about active VLAN members and through which port they can be reached. It thus ensures that all GVRP participants on a bridged LAN maintain the same VLAN registration information. The VLAN registration information propagated by GVRP includes both manually configured local static entries and dynamic entries from other devices.

GVRP provides the following three registration types on a port:

l           Normal –– Enables the port to dynamically register and deregister VLANs, and to propagate both dynamic and static VLAN information.

l           Fixed –– Disables the port to dynamically register and deregister VLANs or propagate information about dynamic VLANs, but allows the port to propagate information about static VLANs. A trunk port with fixed registration type thus allows only manually configured VLANs to pass through even though it is configured to carry all VLANs.

l           Forbidden –– Disables the port to dynamically register and deregister VLANs, and to propagate VLAN information except information about VLAN 1. A trunk port with forbidden registration type thus allows only VLAN 1 to pass through even though it is configured to carry all VLANs.

3.1.3  Protocols and Standards

GVRP is described in IEEE 802.1Q.

3.2  GVRP Configuration Task List

 

&  Note:

GVRP can only be configured on Trunk ports.

 

Complete the following tasks to configure GVRP:

Task

Remarks

Enabling GVRP

Required

Configuring GARP Timers

Optional

 

3.3  Configuring GVRP

3.3.1  Enabling GVRP

Follow these steps to enable GVRP on a trunk port:

To do…

Use the command…

Remarks

Enter system view

system-view

––

Enable GVRP globally

gvrp

Required

Globally disabled by default

Enter Ethernet port view or port-group view

Enter Ethernet port view

interface interface-type interface-number

Use either command.

In Ethernet port view, the subsequent configurations only apply to the current port; in port group view, the subsequent configurations apply to all ports in the port group.

Enter port group view

port-group { aggregation agg-id | manual port-group-name }

Enable GVRP on the port

gvrp

Required

Disabled by default

Configure the GVRP registration mode on the port

gvrp registration { fixed | forbidden | normal }

Optional

The default is normal.

 

&  Note:

Because GVRP is not compatible with the BPDU tunneling feature, you must disable BPDU tunneling before enabling GVRP on a BPDU tunneling–enabled Ethernet port.

 

3.3.2  Configuring GARP Timers

Follow these steps to configure GARP timers:

To do…

Use the command…

Remarks

Enter system view

system-view

––

Configure the GARP LeaveAll timer

garp timer leaveall timer-value

Optional

The default is 1000 centiseconds.

Enter Ethernet port view or port-group view

Enter Ethernet port view

interface interface-type interface-number

Use either command.

In Ethernet port view, the subsequent configurations only apply to the current port; in port group view, the subsequent configurations apply to all ports in the port group.

Enter port-group view

port-group { manual port-group-name | aggregation agg-id }

Configure the hold timer, join timer, and leave timer

garp timer { hold | join | leave } timer-value

Optional

The default is 10 centiseconds for the hold timer, 20 centiseconds for the join timer, and 60 centiseconds for the leave timer.

 

As for the GARP timers, note that:

l           The setting of each timer must be a multiple of five (in centiseconds).

l           The settings of the timers are correlated. If you fail to set a timer to a certain value, you can try to adjust the settings of the rest timers. Table 3-2 shows the relationship of the timers.

Table 3-2 Dependencies of GARP timers

Timer

Lower limit

Upper limit

Hold

10 centiseconds

Not greater than half of the join timer setting

Join

Not less than two times the hold timer setting

Less than half of the leave timer setting

Leave

Greater than two times the join timer setting

Less than the LeaveAll timer setting

LeaveAll

Greater than the leave timer setting

32765 centiseconds

 

3.4  Displaying and Maintaining GVRP

To do…

Use the command…

Remarks

Display statistics about GARP

display garp statistics [ interface interface-list ]

Available in any view

Display GARP timers for specified or all ports

display garp timer [ interface interface-list ]

Available in any view

Display the local VLAN information maintained by GVRP

display gvrp local-vlan interface interface-type interface-number

Available in any view

Display the current GVRP state

display gvrp state interface interface-type interface-number vlan vlan-id

Available in any view

Display statistics about GVRP

display gvrp statistics [ interface interface-list ]

Available in any view

Display the global GVRP state

display gvrp status

Available in any view

Display the information about dynamic VLAN operations performed on a port

display gvrp vlan-operation interface interface-type interface-number

Available in any view

Clear the GARP statistics

reset garp statistics [ interface interface-list ]

Available in user view

 

3.5  GVRP Configuration Examples

3.5.1  GVRP Configuration Example I

I. Network requirements

Configure GVRP for dynamic VLAN information registration and update among devices, adopting the normal registration mode on ports.

II. Network diagram

Figure 3-2 Network diagram for GVRP configuration

III. Configuration procedure

1)         Configure Device A

# Enable GVRP globally.

<DeviceA> system-view

[DeviceA] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceA] interface GigabitEthernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] port link-type trunk

[DeviceA-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1, the Trunk port.

[DeviceA-GigabitEthernet1/0/1] gvrp

[DeviceA-GigabitEthernet1/0/1] quit

# Create VLAN 2 (a static VLAN).

[DeviceA] vlan 2

2)         Configure Device B

# Enable GVRP globally.

<DeviceB> system-view

[DeviceB] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceB] interface GigabitEthernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] port link-type trunk

[DeviceB-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1, the Trunk port.

[DeviceB-GigabitEthernet1/0/1] gvrp

[DeviceB-GigabitEthernet1/0/1] quit

# Create VLAN 3 (a static VLAN).

[DeviceB] vlan 3

3)         Verify the configuration

# Display dynamic VLAN information on Device A.

[DeviceA] display vlan dynamic

 Now, the following dynamic VLAN exist(s):

  3

# Display dynamic VLAN information on Device B.

[DeviceB] display vlan dynamic

 Now, the following dynamic VLAN exist(s):

  2

3.5.2  GVRP Configuration Example II

I. Network requirements

Configure GVRP for dynamic VLAN information registration and update among devices. Specify fixed GVRP registration on Device A and normal GVRP registration on Device B.

II. Network diagram

Figure 3-3 Network diagram for GVRP configuration

III. Configuration procedure

1)         Configure Device A

# Enable GVRP globally.

<DeviceA> system-view

[DeviceA] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceA] interface GigabitEthernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] port link-type trunk

[DeviceA-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1.

[DeviceA-GigabitEthernet1/0/1] gvrp

# Set the GVRP registration type to fixed on the port.

[DeviceA-GigabitEthernet1/0/1] gvrp registration fixed

[DeviceA-GigabitEthernet1/0/1] quit

# Create VLAN 2 (a static VLAN).

[DeviceA] vlan 2

2)         Configure Device B

# Enable GVRP globally.

<DeviceB> system-view

[DeviceB] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceB] interface GigabitEthernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] port link-type trunk

[DeviceB-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1.

[DeviceB-GigabitEthernet1/0/1] gvrp

[DeviceB-GigabitEthernet1/0/1] quit

# Create VLAN 3 (a static VLAN).

[Sysname] vlan 3

3)         Verify the configuration

# Display dynamic VLAN information on Device A.

[DeviceA] display vlan dynamic

 No dynamic vlans exist!

# Display dynamic VLAN information on Device B.

[DeviceB] display vlan dynamic

 Now, the following dynamic VLAN exist(s):

  2

3.5.3  GVRP Configuration Example III

I. Network requirements

To prevent dynamic VLAN information registration and update among devices, set the GVRP registration mode to forbidden on Device A and normal on Device B.

II. Network diagram

Figure 3-4 Network diagram for GVRP configuration

III. Configuration procedure

1)         Configure Device A

# Enable GVRP globally.

<DeviceA> system-view

[DeviceA] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceA] interface GigabitEthernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] port link-type trunk

[DeviceA-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1.

[DeviceA-GigabitEthernet1/0/1] gvrp

# Set the GVRP registration type to forbidden on the port.

[DeviceA-GigabitEthernet1/0/1] gvrp registration forbidden

[DeviceA-GigabitEthernet1/0/1] quit

# Create VLAN 2 (a static VLAN).

[DeviceA] vlan 2

2)         Configure Device B

# Enable GVRP globally.

<DeviceB> system-view

[DeviceB] gvrp

# Configure port GigabitEthernet 1/0/1 as a Trunk port, allowing all VLANs to pass.

[DeviceB] interface GigabitEthernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] port link-type trunk

[DeviceB-GigabitEthernet1/0/1] port trunk permit vlan all

# Enable GVRP on GigabitEthernet 1/0/1.

[DeviceB-GigabitEthernet1/0/1] gvrp

[DeviceB-GigabitEthernet1/0/1] quit

# Create VLAN 3 (a static VLAN).

[DeviceB] vlan 3

3)         Verify the configuration

# Display dynamic VLAN information on Device A.

[DeviceA] display vlan dynamic

 No dynamic vlans exist!

# Display the VLANs allowed on GigabitEthernet 1/0/1.

[DeviceA] display interface GigabitEthernet 1/0/1

GigabitEthernet1/0/1 current state: DOWN

 IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 00e0-fc55-0010

 Description: GigabitEthernet1/0/1 Interface

 Loopback is not set

 Media type is twisted pair

 Port hardware type is  1000_BASE_T

 Unknown-speed mode, unknown-duplex mode

 Link speed type is autonegotiation, link duplex type is autonegotiation

 Flow-control is not enabled

 The Maximum Frame Length is 9212

 Broadcast MAX-ratio: 100%

 Unicast MAX-ratio: 100%

 Multicast MAX-ratio: 100%

 Allow jumbo frame to pass

 PVID: 1

 Mdi type: auto

 Link delay is 0(sec)

 Port link-type: trunk

  VLAN passing  : 1(default vlan)

  VLAN permitted: 1(default vlan)

(Omitted)

The above output indicates that port GigabitEthernet 1/0/1 only allows packets of VLAN 1 to pass.

# Display dynamic VLAN information on Device B.

[DeviceB] display vlan dynamic

 No dynamic vlans exist!

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网