No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

S9300, S9300E, and S9300X V200R012C00 Configuration Guide - Ethernet Switching

This document describes the configuration of Ethernet services, including configuring MAC address table, link aggregation, VLANs, VLAN aggregation, MUX VLAN, VLAN termination, Voice VLAN, VLAN mapping, QinQ, GVRP, STP/RSTP/MSTP, VBST, SEP, RRPP, ERPS, LBDT, HVRP, and Layer 2 protocol transparent transmission.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of VLAN Switch

Overview of VLAN Switch

VLAN Switch is a forwarding method that forwards data according to the information in VLAN tags of received frames. This method requires a pre-configured static forwarding path along switching nodes on the network. When receiving VLAN-tagged frames matching VLAN Switch entries, a switching node forwards the frames to the interfaces manually specified in the VLAN Switch table. VLAN Switch improves the forwarding efficiency and security of the switch, and prevents MAC address attacks and broadcast storms.

The VLAN Switch feature includes two sub-functions: stack-vlan and switch-vlan.

  • Stack-vlan: adds an outer VLAN tag to frames.

  • Switch-vlan: changes the outer VLAN tag when forwarding frames between different interfaces.

Stack-vlan

Similar to the VLAN stacking function, the stack-vlan function is a Layer 2 technology that adds an outer VLAN tag to each frame. It determines which outer VLAN tags to add to frames depending on information in the original VLAN tags carried in the frames. Table 6-1 compares the stack-vlan and VLAN stacking functions. For details about VLAN stacking, see Selective QinQ.

Table 6-1  Comparison between stack-vlan and VLAN stacking

Function

Similarity

Difference

Advantage and Disadvantage

Stack-vlan

  • A receiving interface adds a new VLAN tag outside the original VLAN tag of a received frame.

  • Multiple VLANs can be configured on an interface, and an interface can add different outer tags to frames from different VLANs.

  • An interface adds an outer tag to received frames and removes the outermost tag before sending the frames.

Stack-vlan requires a pre-configured static forwarding path along switching nodes on the network. When receiving VLAN-tagged frames matching VLAN Switch entries, a switching node forwards the frames to the interfaces manually specified in the VLAN Switch table.

The VLANs used in VLAN Switch cannot be created in the system view.

  • Advantage:

    Switching nodes forward frames without searching for entries in the MAC address table. This improves forwarding efficiency and network security, and prevents MAC address attacks and broadcast storms.

  • Disadvantage:

    The network administrator needs to configure a VLAN Switch entry for each user device on the switching node to establish a static forwarding path. This increases the workload and complicates network management if many user devices connect to the switching node.

VLAN stacking

Frames are forwarded according to the entries in the MAC address table.

  • Advantage:

    The administrator does not need to specify a static forwarding path, thereby simplifying user access. Frames are forwarded according to the information in the MAC address table.

  • Disadvantage:

    Device forwarding efficiency is low, and the network is prone to broadcast storms and MAC address attacks.

Switch-vlan

Similar to the VLAN mapping function, the switch-vlan function implements inter-VLAN communication. Table 6-2 compares the switch-vlan and VLAN mapping functions. For details about VLAN mapping, see Understanding VLAN Mapping.

Table 6-2  Comparison between switch-vlan and VLAN mapping

Function

Similarity

Difference

Advantage and Disadvantage

Switch-vlan

  • After receiving a VLAN-tagged frame, an interface replaces the outer VLAN tag of the frame.

  • Before sending a frame to another VLAN, an interface configured with VLAN mapping or switch-vlan replaces the VLAN tag of the frame with the destination VLAN tag.

  • After receiving a frame from another VLAN, an interface replaces the VLAN tag of the frame with the local VLAN tag.

Switch-vlan requires a pre-configured static forwarding path along switching nodes on the network. When receiving VLAN-tagged frames matching VLAN Switch entries, a switching node forwards the frames to the interfaces manually specified in the VLAN Switch table.

The VLANs used in VLAN Switch cannot be created in the system view.

  • Advantage:

    Switching nodes forward frames without searching for entries in the MAC address table. This improves forwarding efficiency and network security, and prevents MAC address attacks and broadcast storms.

  • Disadvantage:

    The network administrator needs to configure a VLAN Switch entry for each user device on the switching node to establish a static forwarding path. This increases the workload and complicates network management if many user devices connect to the switching node.

VLAN mapping

A switch configured with the VLAN mapping function forwards frames according to the MAC address table.

VLAN mapping requires that IP addresses of devices in both VLANs be in the same network segment.

  • Advantage:

    The administrator does not need to specify a static forwarding path, thereby simplifying user access. Frames are forwarded according to the information in the MAC address table.

  • Disadvantage:

    Device forwarding efficiency is low, and the network is prone to broadcast storms and MAC address attacks.

Translation
Download
Updated: 2019-01-18

Document ID: EDOC1100038290

Views: 114083

Downloads: 24

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next