01-Access Volume

HomeSupportSwitchesH3C S3610[S5510] Switch SeriesConfigure & DeployConfiguration GuidesH3C S3610[S5510] Series Ethernet Switches Operation Manual-Release 5309-6W10001-Access Volume
01-Access Volume
Title Size Downloads
13-VLAN Mapping Configuration.pdf 231.24 KB
Table of Contents
Related Documents
13-VLAN Mapping Configuration
Title Size Download
13-VLAN Mapping Configuration 231.24 KB

VLAN Mapping Configuration

When configuring VLAN mapping, go to these sections for information you are interested in:

l          VLAN Mapping Overview

l          VLAN Mapping Configuration Task List

l          Configuring One-to-One VLAN Mapping

l          Configuring Many-to-One VLAN Mapping

l          VLAN Mapping Configuration Examples

VLAN Mapping Overview

VLAN mapping maps the customer VLANs (CVLANs) to service-provider VLANs (SVLANs). Types of VLAN mapping include:

l          One-to-one VLAN mapping that maps the CVLAN ID in the VLAN tag to the SVLAN ID.

l          Many-to-one VLAN mapping that maps the CVLAN IDs in the VLAN tags of traffic of more than two VLANs to the same SVLAN ID.

The two mapping types are the same in the basic implementation except in the number of CVLANs. One-to-one VLAN mapping is many-to-one VLAN mapping with the number of CVLANs being 1.

The following sections present the scenario to which these VLAN mapping types apply.

One-to-One VLAN Mapping and Many-to-One VLAN Mapping

One-to-one VLAN mapping and many-to-one VLAN mapping are mainly applied in campus networks as shown in Figure 1-1.

Figure 1-1 Scenario for one-to-one/multiple-to-one VLAN mapping

 

In such a network, different VLANs are used for transmitting different services (PC, IPTV, and VoIP for example) of a home user. Furthermore, to differentiate home users that are using the same service, you need to perform one-to-one VLAN mapping to map the service traffic to different VLANs by user on the corridor switches. However, an access device on the distribution layer is likely unable to support the number of VLANs required for this type of VLAN mapping.

To reduce the number of VLANs required on the edge device at the distribution layer, you can adopt many-to-one VLAN mapping. This type of VLAN mapping maps the VLANs carrying the same service of different users to the same VLAN while isolating the service traffic of different users.

Basic Concepts of VLAN Mapping

Before you configure VLAN mappings, be aware of the following concepts, which will be used throughout this document.

l          Uplink traffic: Traffic transmitted from a home user network to a distribution network or from a user network to an SP network.

l          Downlink traffic: Traffic transmitted from a distribution network to a home user network or from an SP network to a user network.

l          Uplink port: A port transmitting uplink traffic and receiving downlink traffic.

l          Downlink port: A port transmitting downlink traffic and receiving uplink traffic.

l          Uplink policy: A QoS policy containing VLAN mappings for uplink traffic.

l          Downlink policy: A QoS policy containing VLAN mappings for downlink traffic.

How VLAN Mapping Is Implemented

This section describes how VLAN mapping is implemented on your device.

One-to-one VLAN mapping

1)        Approach 1

On the downlink port

On the uplink port

For uplink traffic

For downlink traffic

Do…

Based on…

Do…

Based on…

Replace the customer VLAN (CVLAN) with the service provider VLAN (SVLAN)

Uplink policy in the inbound direction

Replace the SVLAN with the original CVLAN

DHCP snooping address table, which contains mappings of the SVLAN, IP address, MAC address, and CVLAN for DHCP clients

 

l          For information about DHCP snooping, refer to DHCP Configuration.

l          For information about QoS policies, refer to QoS Configuration

 

Many-to-one VLAN mapping

On the downlink port

On the uplink port

For uplink traffic

For downlink traffic

Do...

Based on…

Do...

Based on…

Map all specified customer VLANs (CVLANs) to one service provider VLAN (SVLAN)

Uplink policy in the inbound direction

Replace the SVLAN with the original CVLAN

DHCP snooping address table, which contains mappings of the SVLAN, IP address, MAC address, and CVLAN for DHCP clients

 

l          For information about DHCP snooping, refer to DHCP Configuration.

l          For information about QoS policies, refer to QoS Configuration.

 

VLAN Mapping Configuration Task List

You need to configure VLAN mapping on your device depending on its position in the network.

Complete the following tasks to configure VLAN mapping:

Task

Remarks

Configuring One-to-One VLAN Mapping

Optional

Perform this configuration on the corridor switches shown in Figure 1-1

Configuring Many-to-One VLAN Mapping

Optional

Perform this configuration on the campus switches shown in Figure 1-1

 

For VLAN mapping to work, you are required to do the following in addition to configuring QoS policies:

l          Enable ARP detection to send ARP packets to the CPU to allow modification of the VLAN attributes carried in the packets, which is impossible with the normal ARP packet processing procedure. For information about ARP detection, refer to ARP Configuration.

l          Enable the dynamic address binding support of IP Source Guard to filter packets received on a port based on the source IP address and MAC address bindings created dynamically to prevent illegal packets from passing through the port. For information about this feature, refer to IP Source Guard Configuration.

l          To save system resources, disable user bindings recording on the DHCP snooping trusted ports that forward DHCP packets. For information about this feature, refer to DHCP Configuration

Configuring One-to-One VLAN Mapping

Perform one-to-one VLAN mapping on the corridor switches shown in Figure 1-1 to use VLANs to isolate different services of different users.

Configuring One-to-One VLAN Mapping

Configuration prerequisites

l          All service terminals of home users are using DHCP for obtaining an IP address. For how to get an IP address through DHCP, refer to DHCP Configuration in the IP Services Volume.

l          The CVLAN-to-SVLAN mappings have been planned.

Configuration procedure

Follow these steps to configure a one-to-one VLAN mapping:

To do...

Use the command...

Remarks

Enter system view

system-view

Enable DHCP snooping

dhcp-snooping

Required

Disabled by default.

Enable ARP detection on the CVLAN and the SVLAN for the VLAN mapping

Create a VLAN and enter VLAN view

vlan vlan-id

Required

Disabled by default.

Repeat this step for all CVLANs and SVLANs that the VLAN mapping involves.

Enable ARP detection

arp detection enable

Exit to system view

quit

Configure an uplink policy to map the CVLAN to the SVLAN

Refer to Table 1-1.

Required

Repeat this step to create multiple CVLAN-to-SVLAN mappings.

Enter the interface view of the downlink port

interface interface-type interface-number

Set the link type of the downlink port to trunk

port link-type trunk

Required

Configure the downlink port to permit the CVLAN to pass through

port trunk permit vlan { vlan-id-list | all }

Required

By default, a trunk port permits only VLAN 1 to pass through.

Enable the dynamic address binding function of IP Source Guard

ip check source ip-address mac-address

Required

Apply the uplink policy to the downlink port

qos apply policy policy-name inbound

Required

Exit to system view

quit

Enter the interface view of the uplink port

interface interface-type interface-number

Configure the uplink port as a DHCP snooping trusted port

dhcp-snooping trust

Required

By default, all ports with DHCP snooping enabled are DHCP snooping untrusted ports.

Configure the uplink port as an ARP trusted port

arp detection trust

Required

By default, all ports are ARP untrusted ports.

Set the link type of the uplink port to trunk

port link-type trunk

Required

Configure the uplink port to permit the specified SVLANs to pass through

port trunk permit vlan { vlan-id-list | all }

Required

By default, a trunk port permits only VLAN 1 to pass through.

 

Table 1-1 Configure an uplink policy

To do...

Use the command...

Remarks

Enter system view

system-view

Create a class and enter class view

traffic classifier tcl-name operator or

Required

Specify the CVLAN for the VLAN mapping

if-match customer-vlan-id vlan-id-value

Required

Exit to system view

quit

Create a traffic behavior and enter traffic behavior view

traffic behavior behavior-name

Required

Specify the SVLAN for the VLAN mapping

remark service-vlan-id vlan-id-value

Required

Exit to system view

quit

Create a QoS policy and enter QoS policy view

qos policy policy-name

Required

Map the CVLAN to the SVLAN by associating the traffic class with the traffic behavior

classifier tcl-name behavior behavior-name mode dot1q-tag-manipulation

Required

Exit to system view

quit

 

l          The VLAN mapping configuration above takes effect when the user goes online the next time.

l          To change a VLAN mapping, you must first use the reset dhcp-snooping command to clear the corresponding DHCP snooping address binding entry (refer to DHCP Commands in the IP Services Volume) or disable the dynamic address binding function of IP Source Guard on the downlink port and then enable dynamic address binding (refer to IP Source Guard Commands in the Security Volume).

 

Configuring Many-to-One VLAN Mapping

Perform many-to-one VLAN mapping on the campus switches shown in Figure 1-1 to carry the same service of different users using the same VLAN on the service provider’s network.

Configuring Many-to-One VLAN mapping (Approach 1)

Configuration prerequisites

The CVLAN-to-SVLAN mappings have been planned.

Configuration procedure

Follow these steps to configure a many-to-one VLAN mapping:

To do...

Use the command...

Remarks

Enter system view

system-view

Enable DHCP snooping

dhcp-snooping

Required

Disabled by default.

Enable ARP detection on the CVLANs and the SVLAN for the VLAN mapping

Create a VLAN and enter VLAN view

vlan vlan-id

Required

Disabled by default.

Repeat these steps for all CVLANs and the SVLAN that the VLAN mapping involves.

Enable ARP detection

arp detection enable

Exit to system view

quit

Configure an uplink policy to map the CVLANs to the same SVLAN

Refer to Table 1-2

Required

Enter the interface view of the downlink port

interface interface-type interface-number

Set the link type of the downlink port to trunk

port link-type trunk

Required

Configure the downlink port to permit the specified CVLANs to pass through

port trunk permit vlan { vlan-id-list | all }

Required

By default, a trunk port permits only VLAN 1 to pass through.

Enable the dynamic address binding function of IP Source Guard

ip check source ip-address mac-address

Required

Apply the uplink policy to the downlink port in the inbound direction

qos apply policy policy-name inbound

Required

Exit to system view

quit

Enter the interface view of the uplink port

interface interface-type interface-number

Configure the uplink port as a DHCP snooping trusted port

dhcp-snooping trust

Required

By default, all ports with DHCP snooping enabled are DHCP snooping untrusted ports.

Configure the uplink port as an ARP trusted port

arp detection trust

Required

By default, all ports are ARP untrusted ports.

Set the link type of the uplink port to trunk

port link-type trunk

Required

Configure the uplink port to permit the specified SVLANs to pass through

port trunk permit vlan { vlan-id-list | all }

Required

By default, a trunk port permits only VLAN 1 to pass through.

 

Table 1-2 Configure an uplink policy

To do...

Use the command...

Remarks

Enter system view

system-view

Create a class and enter class view

traffic classifier tcl-name operator or

Required

Specify the CVLANs for the VLAN mapping

if-match customer-vlan-id { vlan-id-list | vlan-id1 to vlan-id2 }

Required

Exit to system view

quit

Create a traffic behavior and enter traffic behavior view

traffic behavior behavior-name

Required

Specify the SVLAN for the VLAN mapping

remark service-vlan-id vlan-id-value

Required

Exit to system view

quit

Create a QoS policy and enter QoS policy view

qos policy policy-name

Required

Map the CVLANs to the SVLAN by associating the traffic class with the traffic behavior

classifier tcl-name behavior behavior-name mode dot1q-tag-manipulation

Required

Exit to system view

quit

 

To change a VLAN mapping, you must first use the reset dhcp-snooping command to clear the DHCP snooping entries (refer to DHCP Commands in the IP Services Volume) or disable the dynamic address binding function of IP Source Guard on the downlink port and then enable dynamic address binding (refer to IP Source Guard Commands in the Security Volume).

 

VLAN Mapping Configuration Examples

One-to-One/Many-to-One VLAN Mapping Configuration Example

Network requirements

In the scenario presented in Figure 1-2, to save VLAN resources, use one VLAN to carry a type of service traffic from Switch C at the campus network edge while isolating the traffic of different home users in the VLAN.

Use VLAN 501 for PC traffic, VLAN 502 for IPTV traffic, and VLAN 503 for VoIP traffic.

Network diagram

Figure 1-2 Network diagram for one-to-one/many-to-one VLAN mapping configuration

 

Configuration procedure

1)        Configuration on Switch A

# Enter system view.

<SwitchA> system-view

# Enable DHCP snooping.

[SwitchA] dhcp-snooping

# Enable ARP detection on each VLAN involved in VLAN mapping.

[SwitchA] vlan 1

[SwitchA-vlan1] arp detection enable

[SwitchA-vlan1] vlan 2

[SwitchA-vlan2] arp detection enable

[SwitchA-vlan2] vlan 3

[SwitchA-vlan3] arp detection enable

[SwitchA-vlan3] vlan 101

[SwitchA-vlan101] arp detection enable

[SwitchA-vlan101] vlan 201

[SwitchA-vlan201] arp detection enable

[SwitchA-vlan201] vlan 301

[SwitchA-vlan301] arp detection enable

[SwitchA-vlan301] vlan 102

[SwitchA-vlan102] arp detection enable

[SwitchA-vlan102] vlan 202

[SwitchA-vlan202] arp detection enable

[SwitchA-vlan202] vlan 302

[SwitchA-vlan302] arp detection enable

[SwitchA-vlan302] quit

# Configure uplink policies to map the CVLANs to the SVLANs.

[SwitchA] traffic classifier c1

[SwitchA-classifier-c1] if-match customer-vlan-id 1

[SwitchA-classifier-c1] traffic classifier c2

[SwitchA-classifier-c2] if-match customer-vlan-id 2

[SwitchA-classifier-c2] traffic classifier c3

[SwitchA-classifier-c3] if-match customer-vlan-id 3

[SwitchA-classifier-c3] quit

[SwitchA] traffic behavior b1

[SwitchA-behavior-b1] remark service-vlan-id 101

[SwitchA-behavior-b1] traffic behavior b2

[SwitchA-behavior-b2] remark service-vlan-id 201

[SwitchA-behavior-b2] traffic behavior b3

[SwitchA-behavior-b3] remark service-vlan-id 301

[SwitchA-behavior-b3] traffic behavior b4

[SwitchA-behavior-b4] remark service-vlan-id 102

[SwitchA-behavior-b4] traffic behavior b5

[SwitchA-behavior-b5] remark service-vlan-id 202

[SwitchA-behavior-b5] traffic behavior b6

[SwitchA-behavior-b6] remark service-vlan-id 302

[SwitchA-behavior-b6] quit

[SwitchA] qos policy p1

[SwitchA-policy-p1] classifier c1 behavior b1 mode dot1q-tag-manipulation

[SwitchA-policy-p1] classifier c2 behavior b2 mode dot1q-tag-manipulation

[SwitchA-policy-p1] classifier c3 behavior b3 mode dot1q-tag-manipulation

[SwitchA-policy-p1] quit

[SwitchA] qos policy p2

[SwitchA-policy-p2] classifier c1 behavior b4 mode dot1q-tag-manipulation

[SwitchA-policy-p2] classifier c2 behavior b5 mode dot1q-tag-manipulation

[SwitchA-policy-p2] classifier c3 behavior b6 mode dot1q-tag-manipulation

[SwitchA-policy-p2] quit

# Configure Ethernet 1/0/1 to permit frames of the specified CVLANs to pass through.

[SwitchA] interface ethernet 1/0/1

[SwitchA-Ethernet1/0/1] port link-type trunk

[SwitchA-Ethernet1/0/1] port trunk permit vlan 1 2 3

# Apply the uplink policy p1 to the inbound direction of Ethernet 1/0/1.

[SwitchA-Ethernet1/0/1] qos apply policy p1 inbound

# Enable the dynamic address binding support of IP Source Guard on Ethernet 1/0/1.

[SwitchA-Ethernet1/0/1] ip check source ip-address mac-address

[SwitchA-Ethernet1/0/1] quit

# Configure Ethernet 1/0/2 to permit frames of the specified CVLANs to pass through.

[SwitchA] interface ethernet 1/0/2

[SwitchA-Ethernet1/0/2] port link-type trunk

[SwitchA-Ethernet1/0/2] port trunk permit vlan 1 2 3

# Apply the uplink policy p2 to the inbound direction of Ethernet 1/0/2.

[SwitchA-Ethernet1/0/2] qos apply policy p2 inbound

# Enable the dynamic address binding support of IP Source Guard on Ethernet 1/0/2.

[SwitchA-Ethernet1/0/2] ip check source ip-address mac-address

[SwitchA-Ethernet1/0/2] quit

# Configure Ethernet 1/0/3 to permit frames of the specified SVLANs to pass through.

[SwitchA] interface ethernet 1/0/3

[SwitchA-Ethernet1/0/3] port link-type trunk

[SwitchA-Ethernet1/0/3] port trunk permit vlan 101 201 301 102 202 302

# Set Ethernet 1/0/3 as a DHCP snooping trusted port.

[SwitchA-Ethernet1/0/3] dhcp-snooping trust

# Set Ethernet 1/0/3 as an ARP trusted port.

[SwitchA-Ethernet1/0/3] arp detection trust

2)        Configuration on Switch B

<SwitchB> system-view

# Enable DHCP snooping.

[SwitchB] dhcp-snooping

# Enable ARP detection on each VLAN involved in VLAN mapping.

[SwitchB] vlan 1

[SwitchB-vlan1] arp detection enable

[SwitchB-vlan1] vlan 2

[SwitchB-vlan2] arp detection enable

[SwitchB-vlan2] vlan 3

[SwitchB-vlan3] arp detection enable

[SwitchB-vlan3] vlan 111

[SwitchB-vlan111] arp detection enable

[SwitchB-vlan111] vlan 211

[SwitchB-vlan211] arp detection enable

[SwitchB-vlan211] vlan 311

[SwitchB-vlan311] arp detection enable

[SwitchB-vlan311] vlan 112

[SwitchB-vlan112] arp detection enable

[SwitchB-vlan112] vlan 212

[SwitchB-vlan212] arp detection enable

[SwitchB-vlan212] vlan 312

[SwitchB-vlan312] arp detection enable

[SwitchB-vlan312] quit

# Configure uplink policies to map CVLANs of different users to different SVLANs.

[SwitchB] traffic classifier c1

[SwitchB-classifier-c1] if-match customer-vlan-id 1

[SwitchB-classifier-c1] traffic classifier c2

[SwitchB-classifier-c2] if-match customer-vlan-id 2

[SwitchB-classifier-c2] traffic classifier c3

[SwitchB-classifier-c3] if-match customer-vlan-id 3

[SwitchB-classifier-c3] quit

[SwitchB] traffic behavior b1

[SwitchB-behavior-b1] remark service-vlan-id 111

[SwitchB-behavior-b1] traffic behavior b2

[SwitchB-behavior-b2] remark service-vlan-id 211

[SwitchB-behavior-b2] traffic behavior b3

[SwitchB-behavior-b3] remark service-vlan-id 311

[SwitchB-behavior-b3] traffic behavior b4

[SwitchB-behavior-b4] remark service-vlan-id 112

[SwitchB-behavior-b4] traffic behavior b5

[SwitchB-behavior-b5] remark service-vlan-id 212

[SwitchB-behavior-b5] traffic behavior b6

[SwitchB-behavior-b6] remark service-vlan-id 312

[SwitchB-behavior-b6] quit

[SwitchB] qos policy p1

[SwitchB-policy-p1] classifier c1 behavior b1 mode dot1q-tag-manipulation

[SwitchB-policy-p1] classifier c2 behavior b2 mode dot1q-tag-manipulation

[SwitchB-policy-p1] classifier c3 behavior b3 mode dot1q-tag-manipulation

[SwitchB-policy-p1] quit

[SwitchB] qos policy p2

[SwitchB-policy-p2] classifier c1 behavior b4 mode dot1q-tag-manipulation

[SwitchB-policy-p2] classifier c2 behavior b5 mode dot1q-tag-manipulation

[SwitchB-policy-p2] classifier c3 behavior b6 mode dot1q-tag-manipulation

[SwitchB-policy-p2] quit

# Configure Ethernet 1/0/1 to permit frames of the specified CVLANs to pass through.

[SwitchB] interface ethernet 1/0/1

[SwitchB-Ethernet1/0/1] port link-type trunk

[SwitchB-Ethernet1/0/1] port trunk permit vlan 1 2 3

# Apply the uplink policy p1 to the inbound direction of Ethernet 1/0/1.

[SwitchB-Ethernet1/0/1] qos apply policy p1 inbound

# Enable the dynamic address binding function of IP Source Guard on Ethernet 1/0/1.

[SwitchB-Ethernet1/0/1] ip check source ip-address mac-address

[SwitchB-Ethernet1/0/1] quit

# Configure Ethernet 1/0/2 to permit frames of the specified CVLANs to pass through.

[SwitchB] interface ethernet 1/0/2

[SwitchB-Ethernet1/0/2] port link-type trunk

[SwitchB-Ethernet1/0/2] port trunk permit vlan 1 2 3

# Apply the uplink policy p2 to the inbound direction of Ethernet 1/0/2.

[SwitchB-Ethernet1/0/2] qos apply policy p2 inbound

# Enable the dynamic address binding function of IP Source Guard on Ethernet 1/0/2.

[SwitchB-Ethernet1/0/2] ip check source ip-address mac-address

[SwitchB-Ethernet1/0/2] quit

# Configure Ethernet 1/0/3 to permit frames of the specified SVLANs to pass through.

[SwitchB] interface ethernet 1/0/3

[SwitchB-Ethernet1/0/3] port link-type trunk

[SwitchB-Ethernet1/0/3] port trunk permit vlan 111 211 311 112 212 312

# Configure Ethernet 1/0/3 as a DHCP snooping trusted port.

[SwitchB-Ethernet1/0/3] dhcp-snooping trust

# Configure Ethernet 1/0/3 as an ARP trusted port.

[SwitchB-Ethernet1/0/3] arp detection trust

3)        Configuration on Switch C

# Enter system view.

<SwitchC> system-view

# Enable DHCP snooping.

[SwitchC] dhcp-snooping

# Enable ARP detection on each VLAN involved in VLAN mapping.

[SwitchC] vlan 101

[SwitchC-vlan101] arp detection enable

[SwitchC-vlan101] vlan 201

[SwitchC-vlan201] arp detection enable

[SwitchC-vlan201] vlan 301

[SwitchC-vlan301] arp detection enable

[SwitchC-vlan301] vlan 102

[SwitchC-vlan102] arp detection enable

[SwitchC-vlan102] vlan 202

[SwitchC-vlan202] arp detection enable

[SwitchC-vlan202] vlan 302

[SwitchC-vlan302] arp detection enable

[SwitchC-vlan302] vlan 111

[SwitchC-vlan111] arp detection enable

[SwitchC-vlan111] vlan 211

[SwitchC-vlan211] arp detection enable

[SwitchC-vlan211] vlan 311

[SwitchC-vlan311] arp detection enable

[SwitchC-vlan311] vlan 112

[SwitchC-vlan112] arp detection enable

[SwitchC-vlan112] vlan 212

[SwitchC-vlan212] arp detection enable

[SwitchC-vlan212] vlan 312

[SwitchC-vlan312] arp detection enable

[SwitchC-vlan312] vlan 501

[SwitchC-vlan501] arp detection enable

[SwitchC-vlan501] vlan 502

[SwitchC-vlan502] arp detection enable

[SwitchC-vlan502] vlan 503

[SwitchC-vlan503] arp detection enable

[SwitchC-vlan503] quit

# Configure uplink policies to map the CVLANs that carry the same service for different users to the same SVLAN.

[SwitchC] traffic classifier c1

[SwitchC-classifier-c1] if-match customer-vlan-id 101 to 200

[SwitchC-classifier-c1] traffic classifier c2

[SwitchC-classifier-c2] if-match customer-vlan-id 201 to 300

[SwitchC-classifier-c2] traffic classifier c3

[SwitchC-classifier-c3] if-match customer-vlan-id 301 to 400

[SwitchC-classifier-c3] traffic classifier c4

[SwitchC-classifier-c4] if-match customer-vlan-id 111 to 210

[SwitchC-classifier-c4] traffic classifier c5

[SwitchC-classifier-c5] if-match customer-vlan-id 211 to 310

[SwitchC-classifier-c5] traffic classifier c6

[SwitchC-classifier-c6] if-match customer-vlan-id 311 to 410

[SwitchC-classifier-c6] quit

[SwitchC] traffic behavior b1

[SwitchC-behavior-b1] remark service-vlan-id 501

[SwitchC-behavior-b1] traffic behavior b2

[SwitchC-behavior-b2] remark service-vlan-id 502

[SwitchC-behavior-b2] traffic behavior b3

[SwitchC-behavior-b3] remark service-vlan-id 503

[SwitchC-behavior-b3] quit

[SwitchC] qos policy p1

[SwitchC-policy-p1] classifier c1 behavior b1 mode dot1q-tag-manipulation

[SwitchC-policy-p1] classifier c2 behavior b2 mode dot1q-tag-manipulation

[SwitchC-policy-p1] classifier c3 behavior b3 mode dot1q-tag-manipulation

[SwitchC-policy-p1] quit

[SwitchC] qos policy p2

[SwitchC-policy-p2] classifier c4 behavior b1 mode dot1q-tag-manipulation

[SwitchC-policy-p2] classifier c5 behavior b2 mode dot1q-tag-manipulation

[SwitchC-policy-p2] classifier c6 behavior b3 mode dot1q-tag-manipulation

[SwitchC-policy-p2] quit

# Configure Ethernet 1/0/1 to permit frames of the specified CVLANs to pass through.

[SwitchC] interface ethernet 1/0/1

[SwitchC-Ethernet1/0/1] port link-type trunk

[SwitchC-Ethernet1/0/1] port trunk permit vlan 101 201 301 102 202 302

# Apply the uplink policy p1 to Ethernet 1/0/1.

[SwitchC-Ethernet1/0/1] qos apply policy p1 inbound

# Enable the dynamic address binding function of IP Source Guard on Ethernet 1/0/1.

[SwitchC-Ethernet1/0/1] ip check source ip-address mac-address

[SwitchC-Ethernet1/0/1] quit

# Configure Ethernet 1/0/2 to permit frames of the specified CVLANs to pass through.

[SwitchC] interface ethernet 1/0/2

[SwitchC-Ethernet1/0/2] port link-type trunk

[SwitchC-Ethernet1/0/2] port trunk permit vlan 111 211 311 112 212 312

# Apply the uplink policy p2 to the inbound direction of Ethernet 1/0/2.

[SwitchC-Ethernet1/0/2] qos apply policy p2 inbound

# Enable the dynamic address binding function of IP Source Guard on Ethernet 1/0/2.

[SwitchC-Ethernet1/0/2] ip check source ip-address mac-address

[SwitchC-Ethernet1/0/2] quit

# Configure Ethernet 1/0/3 to permit frames of the specified SVLANs to pass through.

[SwitchC] interface ethernet 1/0/3

[SwitchC-Ethernet1/0/3] port link-type trunk

[SwitchC-Ethernet1/0/3] port trunk permit vlan 501 502 503

# Configure Ethernet 1/0/3 as a DHCP snooping trusted port.

[SwitchC-Ethernet1/0/3] dhcp-snooping trust

# Configure Ethernet 1/0/3 as an ARP trusted port.

[SwitchC-Ethernet1/0/3] arp detection trust

4)        Configuration on Switch D

<SwitchD> system-view

# Enable DHCP snooping.

[SwitchD] dhcp-snooping

# Configure Ethernet 1/0/1 to permit frames of the specified SVLANs to pass through.

[SwitchD] interface ethernet 1/0/1

[SwitchD-Ethernet1/0/1] port link-type trunk

[SwitchD-Ethernet1/0/1] port trunk permit vlan 501 502 503

# Configure Ethernet 1/0/1 as a trusted port and disable DHCP snooping to record the IP-to-MAC bindings for DHCP clients on it.

[SwitchD-Ethernet1/0/1] dhcp-snooping trust no-user-binding

 

On corridor switches, set the link type of the port directly connected to a PC to access or trunk. As frames sent from the PC are VLAN untagged, you need to assign the port to the SVLAN if its link type is access or configure the default VLAN on the port as the SVLAN if its link type is trunk.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网