v
Setting the loop detection interval ······························································································ 144
Displaying and maintaining loop detection ··················································································· 145
Loop detection configuration example ························································································ 145
Network requirements ······································································································ 145
Configuration procedure ··································································································· 145
Verifying the configuration ································································································· 146
Configuring VLANs ······································································· 148
Overview ······························································································································ 148
VLAN frame encapsulation ································································································ 148
Protocols and standards ··································································································· 149
Configuring a VLAN ················································································································ 149
Configuring VLAN interfaces ···································································································· 150
Configuring port-based VLANs ·································································································· 151
Introduction ···················································································································· 151
Assigning an access port to a VLAN ···················································································· 152
Assigning a trunk port to a VLAN ························································································ 153
Assigning a hybrid port to a VLAN ······················································································· 153
Configuring MAC-based VLANs ································································································ 154
Introduction ···················································································································· 154
General configuration restrictions and guidelines ···································································· 157
Configuring static MAC-based VLAN assignment ··································································· 157
Configuring dynamic MAC-based VLAN assignment ······························································· 157
Configuring server-assigned MAC-based VLAN ····································································· 159
Configuring IP subnet-based VLANs ·························································································· 159
Configuring protocol-based VLANs ···························································································· 160
Configuring a VLAN group ······································································································· 161
Displaying and maintaining VLANs ···························································································· 161
VLAN configuration examples ··································································································· 162
Port-based VLAN configuration example ·············································································· 162
MAC-based VLAN configuration example ············································································· 164
IP subnet-based VLAN configuration example ······································································· 166
Protocol-based VLAN configuration example ········································································· 167
Configuring super VLANs ······························································· 171
Super VLAN configuration task list ····························································································· 171
Creating a sub-VLAN ·············································································································· 171
Configuring a super VLAN ······································································································· 171
Configuring a super VLAN interface ··························································································· 172
Displaying and maintaining super VLANs ···················································································· 172
Super VLAN configuration example ··························································································· 173
Network requirements ······································································································ 173
Configuration procedure ··································································································· 173
Verifying the configuration ································································································· 174
Configuring the private VLAN ·························································· 176
Configuration task list·············································································································· 176
Configuration restrictions and guidelines ····················································································· 177
Configuration procedure ·········································································································· 177
Displaying and maintaining the private VLAN ··············································································· 179
Private VLAN configuration examples ························································································· 179
Promiscuous port configuration example ·············································································· 179
Trunk promiscuous port configuration example ······································································ 182
Trunk promiscuous and trunk secondary port configuration example ·········································· 185
Secondary VLAN Layer 3 communication configuration example ··············································· 189
Configuring voice VLANs ······························································· 192
Overview ······························································································································ 192
Methods of identifying IP phones ······························································································· 192
Identifying IP phones through OUI addresses ········································································ 192
Automatically identifying IP phones through LLDP ·································································· 193
Advertising the voice VLAN information to IP phones ····································································· 193