Enterasys 2200 Betriebsanweisung

Seite von 38
Configuration Examples
3-1
3
Configuration Examples
This chapter provides a revised version of the current Example 4 and adds two new examples. The 
examples show how the VLAN Classification Configuration and Protocol Port Configuration 
screens can be used to contain, filter, and secure network traffic. 
3.1
EXAMPLE 4, ISOLATING NETWORK TRAFFIC ACCORDING TO 
PROTOCOL
This example illustrates how to contain AppleTalk protocol traffic to prevent unwanted multicast 
frames from slowing down the whole network and yet be able to send and receive frames 
associated with other protocols. 
In this example, illustrated in 
, the Publications Department is relocating from another 
site to the third floor. This network will consist of six computers and a printer using several 
protocols including the AppleTalk protocol. A characteristic of the AppleTalk protocol is to send 
all frames as multicast frames. These multicast frames will be isolated to a VLAN (Gray VLAN) 
to prevent them from slowing down the other networks. 
A second VLAN (Yellow VLAN) will be established to handle traffic of other protocols. The 
Publications Department users will have access to the mail server on the first floor along with the 
Red, Blue, and Green VLANs.