D-Link DGS-3200-10 Product Manual - Page 84

Private VLAN Settings, Private VLAN domain, Port Type, Description, Promiscuous

Page 84 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Private VLAN Settings The Switch al lows users to create private VLA Ns. A p rivate VLA N divides the Layer 2 b roadcast domain of a VLA N into subdomains and are particularly useful for service providers who need to assign a unique VLAN to each of their customers. Each subdomain is mad e up of sev eral pairs of private VLANs, with each private VL AN pair consisting of a primary and secondary VLAN. All of the VLAN pairs in a private VLAN domain are members of the same primary VLAN. Each subdomain is identified using the secondary VLAN ID. The diagram below illustrates the structure of a Private VLAN domain: Figure 3 - 10. Private VLAN domain The ports in a private VLAN can be one of the following three types: Port Type Description Promiscuous A promiscuous port is a port that is a member of a primary VLAN that can communicate with all interfaces, including ports that have been configured as community and isolated ports on secondary VLANs that are associated with the primary VLAN. Isolated An isolated port is used to describe a host port that is a member of an isolated secondary VLAN. An isolated port is completely isolated at Layer 2 from other ports within the same private VLAN domain, apart from promiscuous ports. All traffic destined to isolated ports is blocked, except for traffic originating from promiscuous ports. Any traffic originating from an isolated port is only forwarded to promiscuous ports. Community A community port is used to describe a host port that is a member of a community secondary VLAN. A community port can communicate with both ports that are members of the same community VLAN and promiscuous ports. Interfaces that are configured as community ports are isolated at Layer 2 from all other interfaces that are members of a different community and from isolated ports that are members of the same private VLAN domain. 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
71
Private VLAN Settings
The Switch al lows users to create private VLA Ns. A p rivate VLA N divides the Layer 2 b roadcast domain of a VLA N into
subdomains and are particularly useful for service providers who need to assign a unique VLAN to each of their customers. Each
subdomain is mad e up of sev eral pairs of private VLANs, with each private VL AN pair consisting of a primary and secondary
VLAN. All of the VLAN pairs in a private VLAN domain are members of the same primary VLAN. Each subdomain is identified
using the secondary VLAN ID.
The diagram below illustrates the structure of a Private VLAN domain:
Figure 3 - 10. Private VLAN domain
The ports in a private VLAN can be one of the following three types:
Port Type
Description
Promiscuous
A promiscuous port is a port that is a member of a primary VLAN that can communicate with
all interfaces, including ports that have been configured as community and isolated ports on
secondary VLANs that are associated with the primary VLAN.
Isolated
An isolated port is used to describe a host port that is a member of an isolated secondary
VLAN. An isolated port is completely isolated at Layer 2 from other ports within the same
private VLAN domain, apart from promiscuous ports. All traffic destined to isolated ports is
blocked, except for traffic originating from promiscuous ports. Any traffic originating from an
isolated port is only forwarded to promiscuous ports.
Community
A community port is used to describe a host port that is a member of a community secondary
VLAN. A community port can communicate with both ports that are members of the same
community VLAN and promiscuous ports. Interfaces that are configured as community ports
are isolated at Layer 2 from all other interfaces that are members of a different community and
from isolated ports that are members of the same private VLAN domain.