EasyManua.ls Logo

D-Link xStack DGS-3610 Series - Page 9

D-Link xStack DGS-3610 Series
703 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
v
11.2.4 Mapping Layer 3 Interfaces of Secondary VLAN and Primary VLAN.......... 11-4
11.2.5 Configuring Layer 2 Interface as Host Port of Private VLAN ....................... 11-4
11.2.6 Configuring Layer 2 Interface as Promiscuous Port of Private VLAN ......... 11-5
11.3 Private VLAN Showing............................................................................................................. 11-6
11.3.1 Showing private VLAN ................................................................................. 11-6
12 802.1Q Tunneling .............................................................................................................................. 12-1
12.1 Understanding 802.1Q Tunneling ............................................................................................12-1
12.2 Configuring 802.1Q tunneling ..................................................................................................12-3
12.2.1 Default Configurations of the 802.1Q Tunneling ..........................................12-3
12.2.2 802.1Q Tunneling Configuration Guide .......................................................12-3
12.2.3 Restriction of 802.1Q Tunneling Configuration ............................................12-4
12.2.4 Configuring an 802.1Q Tunneling Port ........................................................12-4
12.2.5 Configuring an Uplink Port ...........................................................................12-5
12.2.6 Configuring TPID Value in Vendor Tag ........................................................12-5
12.2.7 Configuring Priority Duplication of User Tag ................................................12-6
13 MAC Address Configuration .............................................................................................................. 13-1
13.1 Managing the MAC Address Table ..........................................................................................13-1
13.1.1 Overview ......................................................................................................13-1
13.1.2 Configuring MAC Address ............................................................................13-2
13.1.3 Viewing MAC Addresses Information...........................................................13-5
13.2 The Changing Notification of the MAC Address ......................................................................13-6
13.2.1 Overview ......................................................................................................13-6
13.2.2 Configuring MAC Address Changing Notification Function .........................13-7
13.2.3 Viewing the InformationMAC Address change Notification..........................13-8
13.3 IP and MAC Address Binding ..................................................................................................13-9
13.3.1 Overview ......................................................................................................13-9
13.3.2 Configuring Address Binding ........................................................................13-9
13.3.3 Viewing the Address Binding Table ..............................................................13-9
13.3.4 Configuring the Exceptional Ports for Address Binding .............................13-10
13.3.5 Viewing Exceptional Ports for Address Binding .........................................13-10
14 DHCP Snooping Configuration ......................................................................................................... 14-1
14.1 DHCP Snooping Overview .......................................................................................................14-1
14.1.1 Understanding DHCP ..................................................................................14-1
14.1.2 Understanding DHCP Snooping ..................................................................14-2
14.1.3 Understanding DHCP Snooping information option ....................................14-2
14.1.4 Related Security Functions of DHCP snooping ...........................................14-3
14.1.5 Understanding Address Binding Function of DHCP Snooping ....................14-4

Table of Contents

Other manuals for D-Link xStack DGS-3610 Series

Related product manuals