11.2.4 Mapping Layer 3 Interfaces of Secondary VLAN and Primary VLAN.......... 11-4
11.2.5 Configuring Layer 2 Interface as Host Port of Private VLAN ....................... 11-4
11.2.6 Configuring Layer 2 Interface as Promiscuous Port of Private VLAN ......... 11-5
11.3 Private VLAN Showing............................................................................................................. 11-6
11.3.1 Showing private VLAN ................................................................................. 11-6
12 802.1Q Tunneling .............................................................................................................................. 12-1
12.1 Understanding 802.1Q Tunneling ............................................................................................12-1
12.2 Configuring 802.1Q tunneling ..................................................................................................12-3
12.2.1 Default Configurations of the 802.1Q Tunneling ..........................................12-3
12.2.2 802.1Q Tunneling Configuration Guide .......................................................12-3
12.2.3 Restriction of 802.1Q Tunneling Configuration ............................................12-4
12.2.4 Configuring an 802.1Q Tunneling Port ........................................................12-4
12.2.5 Configuring an Uplink Port ...........................................................................12-5
12.2.6 Configuring TPID Value in Vendor Tag ........................................................12-5
12.2.7 Configuring Priority Duplication of User Tag ................................................12-6
13 MAC Address Configuration .............................................................................................................. 13-1
13.1 Managing the MAC Address Table ..........................................................................................13-1
13.1.1 Overview ......................................................................................................13-1
13.1.2 Configuring MAC Address ............................................................................13-2
13.1.3 Viewing MAC Addresses Information...........................................................13-5
13.2 The Changing Notification of the MAC Address ......................................................................13-6
13.2.1 Overview ......................................................................................................13-6
13.2.2 Configuring MAC Address Changing Notification Function .........................13-7
13.2.3 Viewing the InformationMAC Address change Notification..........................13-8
13.3 IP and MAC Address Binding ..................................................................................................13-9
13.3.1 Overview ......................................................................................................13-9
13.3.2 Configuring Address Binding ........................................................................13-9
13.3.3 Viewing the Address Binding Table ..............................................................13-9
13.3.4 Configuring the Exceptional Ports for Address Binding .............................13-10
13.3.5 Viewing Exceptional Ports for Address Binding .........................................13-10
14 DHCP Snooping Configuration ......................................................................................................... 14-1
14.1 DHCP Snooping Overview .......................................................................................................14-1
14.1.1 Understanding DHCP ..................................................................................14-1
14.1.2 Understanding DHCP Snooping ..................................................................14-2
14.1.3 Understanding DHCP Snooping information option ....................................14-2
14.1.4 Related Security Functions of DHCP snooping ...........................................14-3
14.1.5 Understanding Address Binding Function of DHCP Snooping ....................14-4