Copyright 2019 Hewlett Packard Enterprise Development LP
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements accompanying
such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Condential computer software. Valid license from Hewlett Packard Enterprise required for possession, use,
or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Optane®, Pentium®, Xeon®, Intel Inside®, and the Intel Inside logo are trademarks of Intel
Corporation in the U.S. and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java® and Oracle® are registered trademarks of Oracle and/or its
UNIX® is a registered trademark of The Open Group.
aliates.
Contents
Chapter 1 About this guide.............................................................................12
Conguring an existing VLAN as the Management VLAN (CLI)........................................ 40
Obtaining an IP address using DHCP (CLI)..........................................................................41
Disabling the Management feature (CLI)............................................................................ 43
Changing the number of VLANs allowed on the switch (CLI).......................................................44
Displaying a switch VLAN conguration.................................................................................................... 44
Viewing the VLAN membership of one or more ports (CLI).........................................................45
Viewing the conguration for a particular VLAN (CLI).................................................................. 47
Customizing the show VLANs output (CLI).....................................................................................49
Using pattern matching with the show VLANs custom command.................................. 50
Contents3
Creating an alias for show VLAN commands (CLI)........................................................................ 51
Conguring a VLAN MAC address with heartbeat interval......................................................................51
Displaying a VLAN MAC address conguration (CLI).....................................................................51
Using voice VLANs........................................................................................................................................ 52
Operating rules for voice VLANs..................................................................................................... 52
Components of voice VLAN operation........................................................................................... 52
Special VLAN types....................................................................................................................................... 53
VLAN support and the default VLAN.............................................................................................. 53
The primary VLAN............................................................................................................................. 53
The secure Management VLAN....................................................................................................... 54
Operating notes for Management VLANs......................................................................................55
About GVRP................................................................................................................................................... 62
Enabling a port for dynamic joins........................................................................................65
Parameters for controlling VLAN propagation behavior.................................................. 65
GVRP and VLAN access control....................................................................................................... 67
Advertisements and dynamic joins..................................................................................... 67
Port-Leave from a dynamic VLAN........................................................................................ 68
Using GVRP....................................................................................................................................................68
Planning for GVRP operation...........................................................................................................69
Displaying switch current GVRP conguration (CLI)..................................................................... 69
Displaying switch current GVRP conguration (CLI)..................................................................... 70
Enabling and disabling GVRP on the switch (CLI)..................................................................................... 70
Controlling how individual ports handle advertisements for new VLANs (CLI)....................................71
Listing static and dynamic VLANs on a GVRP-enabled switch (CLI)........................................................72
Converting a Dynamic VLAN to a Static VLAN (CLI).................................................................................. 73
show tech mvrp ........................................................................................................................................... 84
conguration on a switch..............................................................................76
Chapter 5 Multimedia
Operation and features............................................................................................................................... 89
CLI: Conguring and displaying IGMP........................................................................................................90
Web: Enabling and disabling IGMP............................................................................................................ 94
How IGMP operates..................................................................................................................................... 94
Excluding multicast addresses from IP multicast ltering................................................................... 101
trac control with IP multicast (IGMP).............89
Contents5
Chapter 6 Multiple instance spanning tree operation...........................103
Overview of MSTP...................................................................................................................................... 103
Deleting an instance.................................................................................................................................. 124
Congure an existent instance.................................................................................................................124
Creating a trac template............................................................................................................. 205
Conguring trac groups within a trac template........................................................207
Moving a priority from one trac group to another.......................................................207
Applying a trac template.............................................................................................................208
Port QoS Trust Mode................................................................................................................................. 209
Mapping of outbound port queues.............................................................................................. 212
Conguring the number of priority queues................................................................................ 212
Viewing the QoS queue conguration..........................................................................................213
QoS operating notes and restrictions......................................................................................................213
Chapter 9 Rapid per-VLAN spanning tree (RPVST+) operation.............215
Overview of RPVST+................................................................................................................................... 215
General steps for conguring RPVST+.....................................................................................................215
Conguring RPVST+ at a glance................................................................................................................216
Selecting RPVST+ as the spanning tree mode............................................................................. 217
Conguring global spanning tree..................................................................................................217
About RPVST+............................................................................................................................................. 226
Comparing spanning tree options................................................................................................226
Understanding how RPVST+ operates..........................................................................................227
Working with the default RPVST+ conguration..............................................................229
Options for conguring a commander and candidates.............................................................248
Creating a stack (Overview).......................................................................................................................250
Viewing stack status (CLI).......................................................................................................................... 251
Viewing the status of an individual switch.............................................................................................. 251
Viewing the status of candidates the Commander has detected (CLI)................................................251
Viewing the status of all stack-enabled switches discovered in the IP subnet (CLI)...........................252
Viewing the status of the Commander and current members of the Commander’s stack (CLI)..... 252
Conguring a Commander switch (CLI)...................................................................................................252
Making a switch a Commander (CLI)....................................................................................................... 253
Using a Member’s CLI to make the Member Commander of a new stack..........................................254
Adding to a stack, or moving switches between stacks (CLI)................................................................254
Using auto join on a Candidate (CLI)........................................................................................................256
Using a Candidate CLI to push the Candidate into a stack................................................................... 256
Using the destination Commander CLI to pull a member from another stack..................................257
Using a Member CLI to push the Member into another stack............................................................. 258
Converting a Commander to a Member of another stack (CLI)........................................................... 258
Removing a Member from a stack (CLI)...................................................................................................259
Removing a stack Member using the Commander’s CLI............................................................259
Removing a stack Member using the Member’s CLI...................................................................259
Accessing Member switches for
Disabling or re-enabling stacking (CLI).................................................................................................... 261
Setting the transmission interval (CLI).....................................................................................................261
Using the Commander to manage the stack.......................................................................................... 261
About stack management......................................................................................................................... 261
Components of Switch stack management.................................................................................262
General stacking operation............................................................................................................262
Overview of smart link...............................................................................................................................281
Smart link
Show smart link group...............................................................................................................................283
Show smart link ush-statistics................................................................................................................ 284
Show receive control..................................................................................................................................284
Show tech smart link..................................................................................................................................284
Examples in this guide are representative and may not match your particular switch/environment. Examples
use simplied prompts as follows:
PromptExplanation
switch#
switch>
switch(config)#
switch(vlan-x)#
switch(eth-x)#
switch-Stack#
switch-Stack(config)#
switch-Stack(stacking)#
switch-Stack(vlan-x)#
switch-Stack(eth-x/y)#
# indicates manager context (authority).
> indicates operator context (authority).
(config) indicates the cong context.
(vlan-x) indicates the vlan context of cong,
where x represents the VLAN ID. For example:
switch(vlan-128)#.
(eth-x) indicates the interface context of cong,where x represents the interface. For example:
switch(eth-48)#.
Stack indicates that stacking is enabled.
Stack(config) indicates the cong context while
stacking is enabled.
Stack(stacking) indicates the stacking context of
cong while stacking is enabled.
Stack(vlan-x) indicates the vlan context of cong
while stacking is enabled, where x represents the
VLAN ID. For example: switch-
Stack(vlan-128)#.
Stack(eth-x/y) indicates the interface context of
cong, in the form (eth-<member-in-stack>/
<interface>). For example: switch(eth-1/48)#
12Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Chapter 2
VLANs
Understanding VLANs
Aruba-OS wired switches are 802.1Q VLAN-enabled. In the factory default state, the switch is enabled for up
to 256 VLANs. You can recongure the switch to support more VLANs. The maximum VLANs allowed varies
according to the switch series.
A group of networked ports assigned to a VLAN form a broadcast domain congured on the switch. On a
given switch, packets are bridged between source and destination ports that belong to the same VLAN.
VLANs enable grouping users by logical function not physical location. They manage bandwidth usage in
networks by:
•Enabling grouping high-bandwidth users on low-trac segments.
•Organizing users from dierent LAN segments according to their need for common resources and
individual protocols.
•Improving trac control at the edge of networks by separating trac of dierent protocol types.
•Enhancing network security by creating subnets to control in-band access to specic network resources.
•Cross-domain broadcast trac in the switch is eliminated and bandwidth saved by not allowing packets
to ood out all ports.
When conguring VLANs, you will need to plan your VLAN strategy as follows:
Procedure
1. Congure static VLANs with:
•a name
•VLAN ID number (VID)
•port members
2. Include port conguration planning to use dynamic VLANs.
3. Create a map of the logical topology.
4. Create a map of the physical topology.
5. Consider the interaction between VLANs and other features:
•Spanning Tree Protocol
•port trunking
•IGMP
6. Congure at least one VLAN in addition to the default VLAN.
7. Congure all ports that pass trac for a particular subnet address on the same VLAN.
Chapter 2 VLANs13
8. Assign the desired switch ports to the new VLANs.
9. Ensure that the VLAN through which you manage the switch has an IP address, if you are managing
VLANs with SNMP in an IP network.
For information on the restrictions when you congure an IP address on a VLAN interface, see the
"Comparing port based and protocol based VLAN" table in Static VLAN operation.
Static VLAN operation
Static VLANs are
GVRP. 802.1Q compatibility enables you to assign each switch port to multiple VLANs.
congured with a name, VLAN ID number (VID) and port members. For dynamic VLANs, see
14Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Table 1: Port based and protocol based VLAN
FunctionPort-Based VLANsProtocol-Based VLANs
IP AddressingUsually congured with at least one
unique IP address.
A port-based VLAN can have no IP
address. However, this limits switch
features available to ports on that VLAN.
See "How IP addressing aects switch
operation" in the chapter "Conguring IP
Addressing" in the Basic Operation Guide
for the switch.
Multiple IP addresses allow multiple
subnets within the same VLAN. See the
chapter on "Conguring IP Addressing" in
the ArubaOS-Switch Basic Operation Guide
for the switch.
Untagged VLAN
Membership
A port can be a member of one untagged,
port-based VLAN. All other port-based
VLAN assignments for that port must be
tagged.
You can congure IP addresses on all
protocol VLANs, but IP addressing is used
only on IPv4 and IPv6 VLANs.
Restrictions:
Loopback interfaces share the same IP
address space with VLAN congurations.
The maximum number of IP addresses
supported on a switch is 2048; this
includes all IP addresses congured for
both VLANs and loopback interfaces
(except for the default loopback IP
address 127.0.0.1).
Each IP address congured on a VLAN
interface must be unique in the switch; it
cannot be used by a VLAN interface or
another loopback interface.
For more information, see the chapter on
"Conguring IP Addressing" in the
ArubaOS-Switch Basic Operation Guide.
A port can be an untagged member of
one protocol VLAN of a specic protocol
type, such as IPX or IPv6. If the same
protocol type is congured in multiple
protocol VLANs, then a port can be an
untagged member of only one of those.
For example, if you have two protocol
VLANs, 100 and 200 and both include IPX,
then a port can be an untagged member
of either VLAN 100 or VLAN 200, but not
both.
A port's untagged VLAN memberships
can include up to four dierent protocol
types. It can be an untagged member of
one of the following:
•Four single-protocol VLANs
•Two protocol VLANs where one VLAN
includes a single protocol and the
other includes up to three protocols
•One protocol VLAN where the VLAN
includes four protocols.
Table Continued
Chapter 2 VLANs15
FunctionPort-Based VLANsProtocol-Based VLANs
Tagged VLAN
Membership
RoutingIf the switch conguration enables IP
A port can be a tagged member of any
port-based VLAN.
routing, the switch can internally route IP
(IPv4) trac between port-based VLANs
and between port-based and IPv4
protocol-based VLANs.
If the switch is not congured to route
trac internally between port-based
VLANs, then an external router must be
used to move trac between VLANs.
A port can be a tagged member of any
protocol-based VLAN.
If the switch conguration enables IP
routing, the switch can internally route
IPv4 trac as follows:
•Between multiple IPv4 protocol-based
VLANs
•Between IPv4 protocol-based VLANs
and port-based VLANs.
Other protocol-based VLANs require an
external router for moving trac
between VLANs.
NOTE: NETbeui and SNA are
non-routable protocols. End
stations intended to receive
trac in these protocols
must be attached to the
same physical network.
You can congure dierent VLAN types in any combination. The default VLAN will always be present. For
more on the default VLAN, see VLAN support and the default VLAN.
16Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
VLAN environmentElements
The default VLAN (portbased; VID of 1) only
Multiple VLAN environmentIn addition to the default VLAN, the conguration can include one or
In the default VLAN conguration, all ports belong to VLAN 1 as
untagged members.
VLAN 1 is a port-based VLAN.
more other port-based VLANs and one or more protocol VLANs.
The maximum VLANs allowed on a switch vary according to the
switch. For details on the maximum VLANs allowed for your switch,
see Changing the number of VLANs allowed on the switch (CLI)
on page 44.
UsingVLAN tagging, ports can belong to multiple VLANs of all
types.Enabling routing on the switch enables it to route IPv4 and IPv6
trac between port-based VLANs and between port-based VLANs
and IPv4 protocol VLANs. Routing other types of trac between
VLANs requires an external router capable of processing the
appropriate protocols.
VLAN operation
General VLAN operation
•A VLAN is composed of multiple ports operating as members of the same subnet or broadcast domain.
•Ports on multiple devices can belong to the same VLAN.
•Trac moving between ports in the same VLAN is bridged (or switched).
•Trac moving between dierent VLANs must be routed.
•A static VLAN is an 802.1Q-compliant VLAN, congured with one or more ports that remain members
regardless of trac usage.
•A dynamic VLAN is an 802.1Q-compliant VLAN membership that the switch temporarily creates on a port
to provide a link to another port either in the same VLAN on another device.
Types of static VLANs available in the switch
Port-based VLANs
This type of static VLAN creates a specic layer-2 broadcast domain comprised of member ports that bridge
trac among themselves. Port-Based VLAN trac is routable on the switches covered in this guide.
Protocol-based VLANs
This type of static VLAN creates a layer-3 broadcast domain for trac of a particular protocol and is
composed of member ports that bridge trac of the specied protocol type among themselves. Some
protocol types are routable on the switches covered in this guide.
Designated VLANs
The switch uses these static, port-based VLAN types to separate switch management trac from other
network trac. While these VLANs are not limited to management trac, they provide improved security
and availability.
Chapter 2 VLANs17
Default VLAN:
This port-based VLAN is always present in the switch and, in the default conguration, includes all ports as
members. See VLAN support and the default VLAN on page 53.
Except for an IP address and subnet, no conguration steps are needed.
A switch in the default VLAN conguration
In this example, devices connected to these ports are in the same broadcast domain.
Primary VLAN:
The switch uses this port-based VLAN to run certain features and management functions, including DHCP/
Bootp responses for switch management. In the default conguration, the Default VLAN is also the Primary
VLAN. However, any port-based, non-default VLAN can be designated the Primary VLAN. See The primary
VLAN on page 53.
Secure Management VLAN:
This optional, port-based VLAN establishes an isolated network for managing switches that support this
feature. Access to this VLAN and to the switch's management functions are available only through ports
congured as members. See The primary VLAN on page 53.
Voice VLANs:
This optional, port-based VLAN type enables separating, prioritizing, and authenticating voice trac moving
through your network, avoiding the possibility of broadcast storms aecting VoIP Voice-over-IP) operation.
See Using voice VLANs on page 52.
NOTE: In a multiple-VLAN environment that includes older switch models there may be
problems related to the same MAC address appearing on dierent ports and VLANs on the
same switch. In such cases, the solution is to impose cabling and VLAN restrictions. For more on
this topic, see Multiple VLAN considerations on page 27.
Multiple port-based VLANs
In the following example, routing within the switch is disabled (the default). Thus, communication between
any routable VLANs on the switch must go through the external router. In this case, VLANs W and X can
exchange trac through the external router, but trac in VLANs Y and Z is restricted to the respective
VLANs.
VLAN 1(the default) is present but not shown. The default VLAN cannot be deleted from the switch, but ports
assigned to other VLANs can be removed from the default VLAN. If internal (IP) routing is enabled on the
switch, then the external router is not needed for trac to move between port-based VLANs.
18Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
A switch with multiple VLANs congured and internal routing disabled
Protocol VLAN environment
The
gure in Multiple port-based VLANs illustrates a protocol VLAN environment also. In this case, VLANs
W and X represent routable protocol VLANs. VLANs Y and Z can be any protocol VLAN.
As noted for the discussion of multiple port-based VLANs, VLAN 1 is not shown. Enabling internal (IP) routing
on the switch allows IP trac to move between VLANs on the switch, but routable, non-IP trac always
requires an external router.
Routing options for VLANs
Table 2: Options for routing between VLAN types in the switch
Note that SNA and NETbeui are not routable protocol types. End stations intended to receive trac in these
protocols must be attached to the same physical network.
PortBased
Port-BasedYes—Yes—————
ProtocolIPX—Yes——————
IPX4Yes—Yes—————
IPV6———Yes
ARP————Yes
AppleTalk—————Yes
SNA————————
NETbeui————————
IPXIPv4IPv6ARPAppleTalkSNANETbeui
1
————
1
———
1
——
802.1Q VLAN tagging
A port can be a member of more than one VLAN of the same type if the device to which the port connects
complies with the 802.1Q VLAN standard.
For example, a port connected to a central server using a network interface card (NIC) that complies with the
802.1Q standard can be a member of multiple VLANs, allowing members of multiple VLANs to use the
server.
Chapter 2 VLANs19
•Although these VLANs cannot communicate with each other through the server, they can all access the
server over the same connection from the switch.
•Where VLANs overlap in this way, VLAN "tags" are used in the individual packets to distinguish between
trac from dierent VLANs.
•A VLAN tag includes the particular VLAN ID. (VID) of the VLAN on which the packet was generated.
For more on this topic, see Conguring or changing static VLAN per-port settings (CLI) on page 34.
Overlapping VLANs using the same server
Similarly, using 802.1Q-compliant switches, you can connect multiple VLANs through a single switch-toswitch link.
Connecting multiple VLANs through the same link
Introducing tagged VLANs into legacy networks running only untagged VLANs
You can introduce 802.1Q-compliant devices into networks that have built untagged VLANs based on earlier
VLAN technology. The fundamental rule is that legacy/untagged VLANs require a separate link for each
VLAN, while 802.1Q, or tagged VLANs can combine several VLANs in one link. Thus on the 802.1Q-compliant
device, separate ports (congured as untagged) must be used to connect separate VLANs to non-802.1Q
devices.
20Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Tagged and untagged VLAN technology in the same network
VLAN tagging rules
When tagging is needed
When a port belongs to two or more VLANs of the same type, they remain as separate broadcast domains
and cannot receive trac from each other without routing.
NOTE:
If multiple, non-routable VLANs exist in the switch—such as NETbeui protocol VLANs—they
cannot receive trac from each other.
Inbound tagged packets
The switch requires VLAN tagging on a given port if the port will be receiving inbound, tagged VLAN trac
that should be forwarded.
If a tagged packet arrives on a port that is not a tagged member of the VLAN indicated by the packet's VID,
the switch drops the packet.
Similarly, the switch drops an inbound, tagged packet if the receiving port is an untagged member of the
VLAN indicated by the packet's VID.
Untagged packet forwarding
If the only authorized, inbound VLAN trac on a port arrives untagged, then the port must be an untagged
member of that VLAN. This is the case where the port is connected to a non-802.1Q compliant device or is
assigned to only one VLAN.
To enable an inbound port to forward an untagged packet, the port must be an untagged member of either
a protocol VLAN matching the packet's protocol, or an untagged member of a port-based VLAN.
That is, when a port receives an incoming, untagged packet, it processes the packet according to the
following ordered criteria:
Chapter 2 VLANs21
1. If the port has no untagged VLAN memberships, the switch drops the packet.
2. If the port has an untagged VLAN membership in a protocol VLAN that matches the protocol type of the
incoming packet, then the switch forwards the packet on that VLAN.
3. If the port is a member of an untagged, port-based VLAN, the switch forwards the packet to that VLAN.
Otherwise, the switch drops the packet.
Figure 1: Untagged VLAN operation
22Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Tagged packet forwarding
If a port is a tagged member of the same VLAN as an inbound, tagged packet received on that port, then the
switch forwards the packet to an outbound port on that VLAN.
To enable the forwarding of tagged packets, any VLAN to which the port belongs as a tagged member must
have the same VID as that carried by the inbound, tagged packets generated on that VLAN.
Figure 2: Tagged VLAN operation
See also Multiple VLAN considerations on page 27.
CAUTION: Rate limiting may behave unpredictably on a VLAN if the VLAN spans multiple
modules or port-banks.
This also applies if a port on a dierent module or port-bank is added to an existing VLAN.
Hewlett Packard Enterprise does not recommend conguring rate limiting on VLANs that
include ports spanning modules or port-banks.
In the following example, ports 2, 3 and 24 form one VLAN, with ports 1 through 24 in the same port-bank.
Ports 28, 29 and 32 form a second VLAN. These ports are also in the same port-bank, which includes ports
25 through 48. Rate limiting will operate as expected for these VLANs.
Figure 3: Example of VLANs using ports from the same port-bank for each VLAN
Applying VLAN tagging
Chapter 2 VLANs23
Example of tagged and untagged VLAN port assignments
If port 7 on an 802.1Q-compliant switch is assigned to only the Red VLAN, the assignment can remain
"untagged" because the port will forward trac only for the Red VLAN. However, if both the Red and Green
VLANs are assigned to port 7, then at least one of those VLAN assignments must be "tagged" so that Red
VLAN trac can be distinguished from Green VLAN trac.
Figure 4: Tagged and untagged VLAN port assignments
In switch X:
•VLANs assigned to ports X1 - X6 can be untagged because there is only one VLAN assignment per port.
Red VLAN trac will go out only the Red ports, Green VLAN trac will go out only the Green ports, and so
on. Devices connected to these ports do not have to be 802.1Q-compliant.
•However, because both the Red VLAN and the Green VLAN are assigned to port X7, at least one of the
VLANs must be tagged for this port.
In switch Y:
•VLANs assigned to ports Y1 - Y4 can be untagged because there is only one VLAN assignment per port.
Devices connected to these ports do not have to be 802.1Q-compliant.
•Because both the Red VLAN and the Green VLAN are assigned to port Y5, at least one of the VLANs must
be tagged for this port.
In both switches:
The ports on the link between the two switches must be congured the same. As shown in the following
gure, the Red VLAN must be untagged on port X7 and Y5 and the Green VLAN must be tagged on port X7
and Y5, or the opposite way.
NOTE: Each 802.1Q-compliant VLAN must have its own unique VID number and that VLAN must
be given the same VID in every device where congured. That is, if the Red VLAN has a VID of 10
in switch X, then 10 must also be the Red VID in switch Y.
Figure 5: Example of VLAN ID numbers assigned in the VLAN names screen
24Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Additional VLAN tagging considerations
•Since the purpose of VLAN tagging is to allow multiple VLANs on the same port, any port that has only
one VLAN assigned to it can be
for that port arrives untagged.
•Any port with two or more VLANs of the same type can have one such VLAN assigned as "Untagged." All
other VLANs of the same type must be
Port-Based VLANsProtocol VLANs
congured as "Untagged" (the default) if the authorized inbound trac
congured as "Tagged," that is:
A port can be a member of one untagged, portbased VLAN. All other port-based VLAN
assignments for that port must be tagged.
A port can be a tagged member of any port-based
VLAN.
A given VLAN must have the same VID on all 802.1Q-compliant devices in which the VLAN occurs. Also,
the ports connecting two 802.1Q devices should have identical VLAN congurations.
•If all end nodes on a port comply with the 802.1Q standard and are congured to use the correct VID, you
can congure all VLAN assignments on a port as "Tagged" if doing so either makes it easier to manage
your VLAN assignments, or if the authorized, inbound trac for all VLANs on the port will be tagged.
For a summary and owcharts of untagged and tagged VLAN operation on inbound trac, see the following
under VLAN tagging rules on page 21:
•"Inbound Tagged Packets"
•"Untagged Packet Forwarding" and Figure 1: Untagged VLAN operation on page 22
•"Tagged Packet Forwarding" and Figure 2: Tagged VLAN operation on page 23
A port can be an untagged member of one
protocol-based VLAN of each protocol type. When
assigning a port to multiple, protocol-based VLANs
sharing the same type, the port can be an
untagged member of only one such VLAN.
A port can be a tagged member of any protocolbased VLAN. See above.
Chapter 2 VLANs25
Example of Networked 802.1Q-compliant devices with multiple VLANs on some
ports
In the following network, switches X and Y and servers S1, S2, and the AppleTalk server are 802.1Qcompliant. (Server S3 could also be 802.1Q-compliant, but it makes no dierence for this example.) This
network includes both protocol-based (AppleTalk) VLANs and port-based VLANs.
•The VLANs assigned to ports X4 - X6 and Y2 - Y5 can all be untagged because there is only one VLAN
assigned per port.
•Port X1 has two AppleTalk VLANs assigned, which means that one VLAN assigned to this port can be
untagged and the other must be tagged.
•Ports X2 and Y1 have two port-based VLANs assigned, so one can be untagged and the other must be
tagged on both ports.
•Ports X3 and Y6 have two port-based VLANs and one protocol-based VLAN assigned. Thus, one portbased VLAN assigned to this port can be untagged and the other must be tagged. Also, since these two
ports share the same link, their VLAN congurations must match.
In the table, "No" means that the port is not a member of that VLAN. For example, port X3 is not a member
of the Red VLAN and does not carry Red VLAN trac. Also, if GVRP were enabled (port-based only), Auto
would appear instead of No.
Switch XSwitch Y
PortAT-1
VLAN
X1Untagged TaggedNoNoY1NoNoUntagged Tagged
AT-2
VLAN
Red
VLAN
Green
VLAN
PortAT-1
VLAN
AT-2
VLAN
Red
VLAN
Green
VLAN
X2NoNoUntagged TaggedY2NoNoNoUntagged
Table Continued
26Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
Switch XSwitch Y
PortAT-1
VLAN
X3NoUntagged Untagged TaggedY3NoUntagged NoNo
X4NoNoNoUntagged Y4NoNoNoUntagged
X5NoNoUntagged NoY5NoNoUntagged No
X6Untagged NoNoNoY6NoUntagged Untagged Tagged
NOTE: VLAN congurations on ports connected by the same link must match. Because ports X2
and Y5 are opposite ends of the same point-to-point connection, both ports must have the
same VLAN conguration,conguring the Red VLAN as "Untagged" and the Green VLAN as
"Tagged.”
AT-2
VLAN
Red
VLAN
Green
VLAN
PortAT-1
VLAN
AT-2
VLAN
Red
VLAN
Green
VLAN
Multiple VLAN considerations
Switches use a forwarding database to maintain awareness of which external devices are located on which
VLANs. Some switches, such as the switches covered in this guide, have a multiple forwarding database,
which means the switch allows multiple database entries of the same MAC address, with each entry showing
the (dierent) source VLAN and source port. Other switch models have a single forwarding database, which
allows only one database entry of a unique MAC address, along with the source VLAN and source port on
which it is found. All VLANs on a switch use the same MAC address. Thus, connecting a multiple forwarding
database switch to a single forwarding database switch where multiple VLANs exist imposes some cabling
and port VLAN assignment restrictions. The following table illustrates the functional dierence between the
two database types.
This database allows multiple destinations for the
same MAC address. If the switch detects a new
destination for an existing MAC entry, it just adds a
new instance of that MAC to the table.
All switches covered in this guide use a multiple forwarding database.
Destination
port
MAC addressDestination
VLAN ID
This database allows only one destination for a MAC
address. If the switch detects a new destination for
an existing MAC entry, it replaces the existing MAC
instance with a new instance showing the new
destination.
Destination
port
Chapter 2 VLANs27
Single forwarding database operation
When a packet arrives with a destination MAC address that matches a MAC address in the switch's
forwarding table, the switch tries to send the packet to the port listed for that MAC address. But if the
destination port is in a dierent VLAN than the VLAN on which the packet was received, the switch drops the
packet. This is not a problem for a switch with a multiple forwarding database because the switch allows
multiple instances of a given MAC address, one for each valid destination. However, a switch with a single
forwarding database allows only one instance of a given MAC address.
TIP: If you connect both switch types through multiple ports or trunks belonging to dierent
VLANs and enable routing on the switch with the multiple-forwarding database, then the port
and VLAN record maintained on the switch with the single-forwarding database for the multipleforwarding database can change frequently. This may cause poor performance and the
appearance of an intermittent or broken connection.
Switch performance is unreliable
The following example provides a method to identify and correct an unsupported
conguration.
Symptom
Poor switch performance, unreliable switch performance, dropped packets, discarded packets, appearance
of intermittent or broken links.
Cause
Incorrect switch conguration.
As shown in the following gure, two switches are connected using two ports on each, and the MAC address
table for Switch A will sometimes record the switch as accessed on port A1 (VLAN 1) and at other times as
accessed on port B1 (VLAN 2).
Procedure
1. PC A sends an IP packet to PC B.
2. The packet enters VLAN 1 in the switch with the MAC address of the switch in the destination eld.
Because the switch has not yet learned this MAC address, it does not nd the address in its address table
and oods the packet out all ports, including the VLAN 1 link (port A1) to the switch. The switch then
routes the packet through the VLAN 2 link to the switch, which forwards the packet on to PC B. Because
the switch received the packet from the switch on VLAN 2 (port B1), the switch's single forwarding
database records the switch as being on port B1 (VLAN 2).
3. PC A now sends a second packet to PC B. The packet again enters VLAN 1 in the switch with the MAC
address of the switch in the destination eld. However, this time the switch's single forwarding database
indicates that the switch is on port B1 (VLAN 2) and the switch drops the packet instead of forwarding it.
4. Later, the switch transmits a packet to the switch through the VLAN 1 link and the switch updates its
address table to show that the switch is on port A1 (VLAN 1) instead of port B1 (VLAN 2). Thus, the
switch's information on the location of the switch changes over time, and the switch discards some
28Aruba 2530 Advanced Trac Management Guide for
ArubaOS-Switch 16.09
packets directed through it for the switch. This causes poor performance and the appearance of an
intermittent or broken link.
Figure 6: Invalid forwarding conguration
Action/solution
Recongure the switches in the conguration.
Procedure
1. Use only one cable or port trunk between single-forwarding and multiple-forwarding database devices.
2. Congure the link with multiple, tagged VLANs.
3. To increase network bandwidth of the connection between devices, use a trunk of multiple physical links.
Following these rules, the switch forwarding database always lists the switch MAC address on port A1 and
the switch will send trac to either VLAN on the switch.
Figure 7: Solution for single-forwarding to multiple-forwarding database devices in a multiple VLAN environment
Connecting the Switch to another switch with a multiple forwarding database
(Example)
Use one or both of the following connection options:
Chapter 2 VLANs29
•A separate port or port trunk interface for each VLAN. This results in a forwarding database having
multiple instances of the same MAC address with dierent VLAN IDs and port numbers. See Forwardingdatabase content. The fact that the switches covered by this guide use the same MAC address on all
VLAN interfaces causes no problems.
•The same port or port trunk interface for multiple (tagged) VLANs. This results in a forwarding database
having multiple instances of the same MAC address with dierent VLAN IDs, but the same port number.
Allowing multiple entries of the same MAC address on dierent VLANs enables topologies such as the
following:
Figure 8: Topology for devices with multiple forwarding databases in a multiple VLAN environment
Conguring VLANs
The CLI congures and displays port-based and protocol-based VLANs.
In the factory default state, the switch is enabled for up to 256 VLANs, all ports belong to the default primary
VLAN and are in the same broadcast/multicast domain. You can recongure the switch to support more
VLANs . The maximum VLANs allowed varies according to the switch series.
The number of VLANs allowed on a switch
The factory default number of VLANs is 256.
You can
maximum VLANs allowed varies according to the switch series. The maximum VLAN values for the switch
documented in this guide are as follows: