Enterasys 2200 Betriebsanweisung
Configuration Examples
3-1
3
Configuration Examples
This chapter provides a revised version of the current Example 4 and adds two new examples. The
examples show how the VLAN Classification Configuration and Protocol Port Configuration
screens can be used to contain, filter, and secure network traffic.
examples show how the VLAN Classification Configuration and Protocol Port Configuration
screens can be used to contain, filter, and secure network traffic.
3.1
EXAMPLE 4, ISOLATING NETWORK TRAFFIC ACCORDING TO
PROTOCOL
PROTOCOL
This example illustrates how to contain AppleTalk protocol traffic to prevent unwanted multicast
frames from slowing down the whole network and yet be able to send and receive frames
associated with other protocols.
frames from slowing down the whole network and yet be able to send and receive frames
associated with other protocols.
In this example, illustrated in
, the Publications Department is relocating from another
site to the third floor. This network will consist of six computers and a printer using several
protocols including the AppleTalk protocol. A characteristic of the AppleTalk protocol is to send
all frames as multicast frames. These multicast frames will be isolated to a VLAN (Gray VLAN)
to prevent them from slowing down the other networks.
protocols including the AppleTalk protocol. A characteristic of the AppleTalk protocol is to send
all frames as multicast frames. These multicast frames will be isolated to a VLAN (Gray VLAN)
to prevent them from slowing down the other networks.
A second VLAN (Yellow VLAN) will be established to handle traffic of other protocols. The
Publications Department users will have access to the mail server on the first floor along with the
Red, Blue, and Green VLANs.
Publications Department users will have access to the mail server on the first floor along with the
Red, Blue, and Green VLANs.