
3
10.1.3 Typical VLAN Application ....................................................................................................10-4
10.2 GVRP CONFIGURATION ................................................................................................................... 10-5
10.2.1 Introduction to GVRP.......................................................................................................... 10-5
10.2.2 GVRP Configuration Task List............................................................................................. 10-6
10.2.3 Typical GVRP Application ...................................................................................................10-7
10.2.4 GVRP Troubleshooting ....................................................................................................... 10-8
10.3 DOT1Q-TUNNEL CONFIGURATION ..................................................................................................... 10-8
10.3.1 Introduction to Dot1q-tunnel................................................................................................ 10-8
10.3.2 Dot1q-tunnel Configuration................................................................................................. 10-9
10.3.3 Typical Applications of the Dot1q-tunnel...........................................................................10-10
10.3.4 Dot1q-tunnel Troubleshooting........................................................................................... 10-11
10.4 DYNAMIC VLAN CONFIGURATION................................................................................................... 10-11
10.4.1 Introduction to Dynamic VLAN.......................................................................................... 10-11
10.4.2 Dynamic VLAN Configuration ........................................................................................... 10-12
10.4.3 Typical Application of the Dynamic VLAN.........................................................................10-14
10.4.4 Dynamic VLAN Troubleshooting....................................................................................... 10-15
10.5 VOICE VLAN CONFIGURATION ....................................................................................................... 10-15
10.5.1 Introduction to Voice VLAN...............................................................................................10-15
10.5.2 Voice VLAN Configuration.................................................................................................10-16
10.5.3 Typical Applications of the Voice VLAN ............................................................................10-16
10.5.4 Voice VLAN Troubleshooting ............................................................................................ 10-17
CHAPTER 11 MAC TABLE CONFIGURATION.............................................................11-1
11.1 INTRODUCTION TO MAC TABLE ........................................................................................................ 11-1
11.1.1 Obtaining MAC Table........................................................................................................... 11-1
11.1.2 Forward or Filter.................................................................................................................. 11-3
11.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST............................................................................ 11-3
11.3 TYPICAL CONFIGURATION EXAMPLES ............................................................................................... 11-4
11.4 MAC TABLE TROUBLESHOOTING ..................................................................................................... 11-5
11.5 MAC ADDRESS FUNCTION EXTENSION............................................................................................. 11-5
11.5.1 MAC Address Binding ......................................................................................................... 11-5
CHAPTER 12 MSTP CONFIGURATION........................................................................12-1
12.1 INTRODUCTION TO MSTP................................................................................................................. 12-1
12.1.1 MSTP Region......................................................................................................................12-1
12.1.2 Port Roles............................................................................................................................12-3
12.1.3 MSTP Load Balance ...........................................................................................................12-3
12.2 MSTP CONFIGURATION TASK LIST................................................................................................... 12-3
12.3 MSTP EXAMPLE.............................................................................................................................. 12-6
12.4 MSTP TROUBLESHOOTING ............................................................................................................ 12-10
CHAPTER 13 QOS CONFIGURATION..........................................................................13-1