Cisco WS-C2960S-24PD-L Software Guide - Page 207

Creating EtherChannel Port Groups, Configuring Protected Ports

Page 207 highlights

Chapter 7 Configuring the Switch Ports Configuring Protected Ports Creating EtherChannel Port Groups Beginning in privileged EXEC mode, follow these steps to create a two-port group: Step 1 Step 2 Command configure terminal interface interface Step 3 Step 4 Step 5 Step 6 Step 7 port group 1 distribution destination interface interface port group 1 distribution destination end show running-config Purpose Enter global configuration mode. Enter interface configuration mode, and enter the port of the first port to be added to the group. Assign the port to group 1 with destination-based forwarding. Enter the second port to be added to the group. Assign the port to group 1 with destination-based forwarding. Return to privileged EXEC mode. Verify your entries. Configuring Protected Ports Some applications require that no traffic be forwarded by the Layer 2 protocol between ports on the same switch. In such an environment, there is no exchange of unicast, broadcast, or multicast traffic between ports on the switch, and traffic between ports on the same switch is forwarded through a Layer 3 device such as a router. To meet this requirement, you can configure Catalyst 2900 XL and Catalyst 3500 XL ports as protected ports (also referred to as private VLAN edge ports). Protected ports do not forward any traffic to protected ports on the same switch. This means that all traffic passing between protected ports-unicast, broadcast, and multicast-must be forwarded through a Layer 3 device. Protected ports can forward any type of traffic to unprotected ports, and they forward as usual to all ports on other switches. Note Sometimes unknown unicast traffic from an unprotected port is flooded to a protected port because a MAC address has timed out or has not been learned by the switch. Use the port block command to guarantee that in such a case no unicast and multicast traffic is flooded to the port. See the "Configuring Flooding Controls" section on page 7-4 for more information. Beginning in privileged EXEC mode, follow these steps to define a port as a protected port: Step 1 Step 2 Step 3 Step 4 Step 5 Command configure terminal interface interface port protected end show port protected Purpose Enter global configuration mode. Enter interface configuration mode, and enter the port to be configured. Enable protected port on the port. Return to privileged EXEC mode. Verify that the protected port option is enabled. Use the no version of the port protected interface configuration command to disable the protected port option. 78-6511-08 Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 7-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368

7-9
Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide
78-6511-08
Chapter 7
Configuring the Switch Ports
Configuring Protected Ports
Creating EtherChannel Port Groups
Beginning in privileged EXEC mode, follow these steps to create a two-port group:
Configuring Protected Ports
Some applications require that no traffic be forwarded by the Layer 2 protocol between ports on the same
switch. In such an environment, there is no exchange of unicast, broadcast, or multicast traffic between
ports on the switch, and traffic between ports on the same switch is forwarded through a Layer 3 device
such as a router.
To meet this requirement, you can configure Catalyst 2900 XL and Catalyst 3500 XL ports as protected
ports (also referred to as private VLAN edge ports). Protected ports do not forward any traffic to
protected ports on the same switch. This means that all traffic passing between protected ports—unicast,
broadcast, and multicast—must be forwarded through a Layer 3 device. Protected ports can forward any
type of traffic to unprotected ports, and they forward as usual to all ports on other switches.
Note
Sometimes unknown unicast traffic from an unprotected port is flooded to a protected port because a
MAC address has timed out or has not been learned by the switch. Use the
port block
command to
guarantee that in such a case no unicast and multicast traffic is flooded to the port. See the
“Configuring
Flooding Controls” section on page 7-4
for more information.
Beginning in privileged EXEC mode, follow these steps to define a port as a protected port:
Use the
no
version of the
port protected
interface configuration command to disable the protected port
option.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface
Enter interface configuration mode, and enter the port of the first port to be
added to the group.
Step 3
port group 1 distribution
destination
Assign the port to group 1 with destination-based forwarding.
Step 4
interface
interface
Enter the second port to be added to the group.
Step 5
port group 1 distribution
destination
Assign the port to group 1 with destination-based forwarding.
Step 6
end
Return to privileged EXEC mode.
Step 7
show running-config
Verify your entries.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface
Enter interface configuration mode, and enter the port to be configured.
Step 3
port protected
Enable protected port on the port.
Step 4
end
Return to privileged EXEC mode.
Step 5
show port protected
Verify that the protected port option is enabled.