Cisco Systems 200 Manual De Usuario

Descargar
Página de 351
VLAN Management
Defining VLAN Membership
Cisco Small Business 200 Series Smart Switch Administration Guide 
176
12
 
Administrative PVID—Enter the Port VLAN ID (PVID) of the VLAN to which 
incoming untagged and priority tagged frames are classified. The possible 
values are 1 to 4094.
Frame Type—Select the type of frame that the interface can receive. 
Frames that are not of the configured frame type are discarded at ingress. 
These frame types are only available in General mode. Possible values are:
-
Admit All—The interface accepts all types of frames: untagged frames, 
tagged frames, and priority tagged frames.
-
Admit Tagged Only—The interface accepts only tagged frames.
-
Admit Untagged Only—The interface accepts only untagged and 
priority frames. 
Ingress Filtering—(Available only in General mode) Select to enable ingress 
filtering. When an interface is ingress filtering enabled, the interface discards 
all incoming frames that are classified as VLANs of which the interface is not 
a member. Ingress filtering can be disabled or enabled on general ports. It is 
always enabled on access ports and trunk ports.
STEP  5
Click Apply. The parameters are written to the Running Configuration file.
Defining VLAN Membership 
The Port to VLAN and Port VLAN Membership pages display the VLAN 
memberships of the ports in various presentations. You can use them to add or 
remove memberships to or from the VLANs. 
When a port is forbidden default VLAN membership, that port is not allowed 
membership in any other VLAN. An internal VID of 4095 is assigned to the port.
To forward packets properly, intermediate VLAN-aware devices that carry VLAN 
traffic along the path between end nodes must be manually configured.
Untagged port membership between two VLAN-aware devices with no 
intervening VLAN-aware devices, must be to the same VLAN. In other words, the 
PVID on the ports between the two devices must be the same if the ports are to 
send and receive untagged packets to and from the VLAN. Otherwise, traffic might 
leak from one VLAN to another.