EasyManua.ls Logo

D-Link xStack User Manual

D-Link xStack
357 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #123 background imageLoading...
Page #123 background image
xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
112
forwarded to the port for transmission, the port will add an 802.1Q tag using the PVID to write the
VID in the tag. When the packet arrives at its destination, the receiving device will use the PVID to
make VLAN forwarding decisions. If the port receives a packet, and Ingress filtering is enabled, the
port will compare the VID of the incoming packet to its PVID. If the two are unequal, the port will
drop the packet. If the two are equal, the port will receive the packet.
Double VLANs
Double or Q-in-Q VLANs allow network providers to expand their VLAN configurations to place customer VLANs within a
larger inclusive VLAN, which adds a new layer to the VLAN configuration. This lets large ISP's create L2 Virtual Private
Networks and also create transparent LANs for their customers, which will connect two or more customer LAN points without
over-complicating configurations on the client's side. Not only will over-complication be avoided, but also now the administrator
has over 4000 VLANs in which over 4000 VLANs can be placed, therefore greatly expanding the VLAN network and enabling
greater support of customers utilizing multiple VLANs on the network.
Double VLANs are basically VLAN tags placed within existing IEEE 802.1Q VLANs which we will call SPVIDs (Service
Provider VLAN IDs). These VLANs are marked by a TPID (Tagged Protocol ID), configured in hex form to be encapsulated
within the VLAN tag of the packet. This identifies the packet as double-tagged and segregates it from other VLANs on the
network, therefore creating a hierarchy of VLANs within a single packet.
Here is an example Double VLAN tagged packet.
Destination Address Source Address SPVLAN (TPID +
Service Provider
VLAN Tag)
802.1Q CEVLAN Tag
(TPID + Customer VLAN
Tag)
Ether Type Payload
Consider the example below:
Figure 3 - 8 Double VLAN Example
In this example, the Service Provider Access Network switch (Provider edge switch) is the device creating and configuring
Double VLANs. Both CEVLANs (Customer VLANs) 10 and 11, are tagged with the SPVID 100 on the Service Provider Access

Table of Contents

Other manuals for D-Link xStack

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack and is the answer not in the manual?

D-Link xStack Specifications

General IconGeneral
BrandD-Link
ModelxStack
CategorySwitch
LanguageEnglish

Summary

Administration

IP Address

Configures the switch's IP address, subnet mask, and default gateway.

Interface Settings

Configures IPv4 and IPv6 interfaces, including IP addresses and subnet masks.

Port Configuration

Configures switch ports, including state, flow control, and speed/duplex settings.

Security

Manages security features like 802.1X, MAC-based access control, and access profiles.

L2 Features

VLANs

Manages Virtual Local Area Networks, including 802.1Q, port-based, and protocol VLANs.

Spanning Tree

Configures Spanning Tree Protocol (STP, RSTP, MSTP) to prevent network loops.

IGMP Snooping

Controls IGMP snooping behavior to optimize multicast traffic forwarding.

LLDP

Configures Link Layer Discovery Protocol (LLDP) for network topology discovery.

QoS

Bandwidth Control

Manages bandwidth allocation and limits for ports to optimize traffic.

QoS Scheduling Mechanism

Configures the scheduling mechanism for hardware queues to prioritize traffic.

802.1p Default Priority

Assigns a default 802.1p priority to each port for traffic prioritization.

ACL (Access Control List)

Access Profile Table

Establishes criteria for forwarding packets based on header information.

ACL Flow Meter

Configures flow metering and packet coloring based on traffic rates.

CPU Interface Filtering

Filters packets destined for the CPU interface to enhance security.

Security

Port Security

Prevents unauthorized devices by locking MAC addresses to ports.

IP-MAC-Port Binding

Restricts client access by binding MAC, IP, and port information.

802.1X

Implements port-based or host-based access control for network security.

Web-based Access Control (WAC)

Configures web-based authentication and access control for users.

Monitoring

Device Status

Displays the status of physical attributes like power supplies and fans.

Stacking Information

Provides information about switches in a stack, including box ID and MAC addresses.

CPU Utilization

Displays CPU usage percentage as an average by time interval.

Packets

Shows packet statistics, including received, transmitted, and error counts.

Save, Reset and Reboot

Reset

Resets the switch to factory defaults, with options to retain certain configurations.

Reboot System

Restarts the switch to apply configuration changes or recover from issues.

Save Services

Manages saving configurations to the switch's memory (RAM and NV-RAM).

Appendix A

Mitigating ARP Spoofing Attacks Using Packet Content ACL

Details how to use Packet Content ACL to prevent ARP spoofing attacks.

Appendix B

Switch Log Entries

Lists and explains entries found in the system log.

Appendix C

Trap Logs

Lists trap logs found on the DGS-3400 Series Switches.

Glossary

Glossary

Provides definitions of technical terms used in the manual.

Related product manuals