122
1. 8 7 7. 8 7 7. 2 2 6 9 BLACKBOX.COM
NEED HELP?
LE AVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.8 7 7. 8 7 7. 2 26 9
3.16.2.2 GROUP TO VLAN
This section allows you to map an already configured Group Name to a VLAN for the selected stack switch unit switch.
Web Interface
To Display Group Name to VLAN mapping table configured in the web interface:
1. Click Group Name VLAN configuration and add a new entry.
2. Specify the Group Name and VLAN ID.
3. Click Apply.
FIGURE 3-73. GROUP NAME OF VLAN MAPPING TABLE
Parameter description:
Delete: To delete a Group Name to VLAN map entry, check this box. The entry will be deleted on the switch during the next Save.
Group Name: A valid Group Name is a string of at most 16 characters that consists of a combination of alphabetic characters (a-z
or A-Z) and integers (0-9); no special character is allowed. Whichever Group name you try to map to a VLAN must be present in the
Protocol to Group mapping table and must not be already used by any other existing mapping entry on this page.
VLAN ID: Indicates the ID to which a Group Name will be mapped. A valid VLAN ID ranges from 1–4095.
Port Members: A row of check boxes for each port is displayed for each Group Name to VLAN ID mapping. To include a port in a
mapping, check the box. To remove or exclude the port from the mapping, make sure the box is unchecked. By default, no ports are
members, and all boxes are unchecked.
Adding a New Group to VLAN mapping entry: Click to add a new entry in mapping table. An empty row is added to the table; the Group
Name, VLAN ID and port members can be configured as needed. Legal values for a VLAN ID are 1 through 4095. The button can be
used to undo the addition of new entry.
Buttons:
- Apply – Click to save changes.
- Reset - Click to undo any changes made locally and revert to previously saved values.
Auto-refresh: Evoke the auto-refresh icon and the device will refresh the information automatically.
Upper right icon (Refresh): Click to refresh the Protocol Group Mapping information manually.
CHAPTER 3: SYSTEM CONFIGURATION