This document contains proprietary information, which is
protected by copyright. No part of this document may be
photocopied, reproduced, or translated into another
language without the prior written consent of HewlettPackard.
Publication Number
5998-2699
September 2011
Applicable Products
HP Switch E3500-24(J9470A)
HP Switch E3500-48 (J9472A)
HP Switch E3500-24-PoE(J9471A)
HP Switch E3500-48-PoE (J9473A)
HP Switch E3500yl-24G-PWR (J8692A)
HP Switch E3500yl-48G-PWR (J8693A)
HP Switch E5406zl (J8697A)
HP Switch E5406zl-48G-PoE+(J9447A)
HP Switch E5412zl (J8698A)
HP Switch E5412zl-96G-PoE+(J9448A)
HP Switch E6200yl-24G (J8992A)
HP Switch E8206zl(J9475A)
HP Switch E8212zl (J8715A/B)
HP Switch E6600-24G(J9263A)
HP Switch E6600-24G-4XG(J9264A)
HP Switch E6600-24G-24XG(J9265A)
HP Switch E6600-48G(J9451A)
HP Switch E6600-48G-4XG(J9452A)
Disclaimer
The information contained in this document is subject to
change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
The only warranties for HP products and services are set
forth in the express warranty statements accompanying
such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions
contained herein.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Software End User License Agreement and
Hardware Limited Warranty
For the software end user license agreement and the
hardware limited warranty information for HP Networking
products, visit
www.hp.com/networking/support.
Trademark Credits
Microsoft, Windows, and Microsoft Windows NT are US
registered trademarks of Microsoft Corporation.
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
www.hp.com/networking/support
Contents
Product Documentation
About Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Where to Go From Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-49
xii
Index
Product Documentation
About Your Switch Manual Set
NoteFor the latest version of all HP switch documentation, including Release Notes
covering recently added features, please visit the HP Networking web site at
www.hp.com/Networking/support.
Electronic Publications
The latest version of each of the publications listed below is available in PDF
format on the HP Networking web site, as described in the Note at the top of
this page.
■Installation and Getting Started Guide—Explains how to prepare for
and perform the physical installation and connect the switch to your
network.
■Basic Operation Guide—Describes how to use the switch interfaces and
introduces basic operations.
■Management and Configuration Guide—Describes how to configure,
manage, and monitor basic switch operation.
■Advanced Traffic Management Guide—Explains how to configure traffic
management features such as VLANs, MSTP, QoS, and Meshing.
■Multicast and Routing Guide—Explains how to configure IGMP, PIM, IP
routing, and VRRP features.
■Access Security Guide—Explains how to configure access security fea-
tures and user authentication on the switch.
■IPv6 Configuration Guide—Describes the IPv6 protocol operations that
are supported on the switch.
■Command Line Interface Reference Guide—Provides a comprehensive
description of CLI commands, syntax, and operations.
■Event Log Message Reference Guide—Provides a comprehensive descrip-
tion of event log messages.
■Release Notes—Describe new features, fixes, and enhancements that
become available between revisions of the main product guide.
xiii
Software Feature Index
For the software manual set supporting your 3500/3500yl/5400zl/6200yl/6600/
8200zl switch model, this feature index indicates which manual to consult for
information on a given software feature.
Intelligent Edge Software Features. These features are automatically
included on all switches.
Premium License Software Features. For the HP 3500, 3500yl, 5400zl,
6600, and 8200zl switches, Premium License features can be acquired by
purchasing the optional Premium License and installing it on the Intelligent
Edge version of these switches. (These features are automatically included on
the HP 6200yl switches.)
Premium License
Software Features
OSPFv2 (IPv4)X
OSPFv3 (IPv6)X
PIM-DM (Dense Mode)X
PIM-SM (Sparse Mode)X
QinQ (Provider Bridging)X
VRRPX
Management
and
Configuration
Advanced
Traff ic
Management
Intelligent Edge
Software Features
802.1Q VLAN TaggingX
802.1X Port-Based PriorityX
802.1X Multiple
Authenticated Clients Per
Port
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Manual
Multicast and
Routing
Manual
Multicast and
Routing
Access
Security
Guide
Access
Security
Guide
X
IPv6
Configuration Guide
IPv6
Configura-
tion Guide
Basic
Operation
Guide
xiv
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Multicast and
Routing
Manual
Access
Security
Guide
Access Control Lists (ACLs)X
IPv6
Configura-
tion Guide
Basic
Operation
Guide
Access Control Lists (ACLs)
X
(IPv6)
AAA AuthenticationX
Authorized IP ManagersX
Authorized IP Managers
X
(IPv6)
Authorized Manager List
X
(Web, Telnet, TFTP)
Auto MDIX ConfigurationX
BOOTPX
Config FileX
Console AccessX
Copy CommandX
Core Dump X
CoS (Class of Service)X
DebugX
DHCP ConfigurationX
DHCPv6 RelayX
DHCP Option 82X
DHCP SnoopingX
DHCP/Bootp OperationX
Diagnostic ToolsX
Diagnostics and
X
Troubleshooting (IPv6)
Distributed TrunkingX
Downloading SoftwareX
xv
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Multicast and
Routing
Manual
Access
Security
Guide
Dynamic ARP ProtectionX
IPv6
Configura-
tion Guide
Basic
Operation
Guide
Dynamic Configuration
X
Arbiter
Dynamic IP LockdownX
Eavesdrop ProtectionX
PCM/PCM+X
Equal Cost Multi-Path
X
(ECMP)
Event LogX
Factory Default SettingsX
Flow Control (802.3x)X
File ManagementX
File TransfersX
Friendly Port NamesX
Guaranteed Minimum
X
Bandwidth (GMB)
GVRPX
Identity-Driven
X
Management (IDM)
IGMPX
Interface Access (Telnet,
Console/Serial, Web)
IP AddressingX
IPv6 AddressingX
IP Preserve (IPv6)X
IP RoutingX
IPv6 Static RoutingX
Jumbo PacketsX
xvi
X
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Manual
Multicast and
Routing
Access
Security
Guide
IPv6
Configura-
tion Guide
Basic
Operation
Guide
Key Management System
X
(KMS)
LACPX
LLDPX
LLDP-MEDX
Loop ProtectionX
MAC Address ManagementX
MAC LockdownX
MAC LockoutX
MAC-based AuthenticationX
Management VLANX
Management Security (IPv6)X
MeshingX
MLDv1/MLDv2X
Monitoring and AnalysisX
Multicast FilteringX
Multiple Configuration FilesX
Network Management
X
Applications (SNMP)
Nonstop Switching (8200zl
X
switches)
Out-of-Band Management
X
(OOBM)
OpenView Device
X
Management
OSPFv3X
Passwords and Password
X
Clear Protection
xvii
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Multicast and
Routing
Manual
Access
Security
Guide
PingX
Policy-based Routing (PBR)X
Port ConfigurationX
Port MonitoringX
Port SecurityX
Port StatusX
Port Trunking (LACP)X
IPv6
Configura-
tion Guide
Basic
Operation
Guide
Port-Based Access Control
(802.1X)
Power over Ethernet (PoE
X
and PoE+)
Protocol FiltersX
Protocol VLANSX
Quality of Service (QoS)X
RADIUS Authentication and
Accounting
RADIUS-Based
Configuration
Rate-LimitingX
RIPX
RMON 1,2,3,9X
RoutingX
Routing - IP StaticX
Route RedistributionX
SavePower FeaturesX
X
X
X
Secure CopyX
Secure Copy (IPv6)X
xviii
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Multicast and
Routing
Manual
Access
Security
Guide
IPv6
Configura-
tion Guide
Secure FTP (IPv6)X
sFlowX
SFTPX
SNMPv3X
SNMP (IPv6)X
Basic
Operation
Guide
Software Downloads (SCP/
X
SFTP, TFPT, Xmodem)
Source-Port FiltersX
Spanning Tree (STP, RSTP,
X
MSTP)
SSHv2 (Secure Shell)
X
Encryption
SSH (IPv6)X
SSL (Secure Socket Layer)X
Stacking (3500/3500yl/
X
6200yl/6600 switches only)
SyslogX
System InformationX
TACACS+ AuthenticationX
Telnet AccessX
Telnet (IPv6)X
TFTPX
Time Protocols (TimeP,
X
SNTP)
Time Protocols (IPv6)X
Traffic MirroringX
Traffic/Security FiltersX
TroubleshootingX
xix
Intelligent Edge
Software Features
Management
and
Configura-
tion
Advanced
Tra ffic
Management
Multicast and
Routing
Manual
Access
Security
Guide
IPv6
Configura-
tion Guide
Tunneling (6in4)X
Basic
Operation
Guide
Uni-Directional Link
X
Detection (UDLD)
UDP ForwarderX
USB Device SupportX
Virus Throttling
X
(Connection-Rate Filtering)
VLANsX
VLAN Mirroring (1 static
X
VLAN)
Voice VLANX
Web Authentication RADIUS
X
Support
Web-based AuthenticationX
Web UIX
xx
Static Virtual LANs (VLANs)
Overview
This chapter describes how to configure and use static, port-based and
protocol-based VLANs on the switches covered in this guide.
1
1-1
Static Virtual LANs (VLANs)
Introduction
Introduction
VLAN Features
FeatureDefaultMenuCLIWebAgent
view existing VLANs n/apage 1-22
configuring static
VLANs
VLANs enable you to group users by logical function instead of physical
location. This helps to control bandwidth usage within your network by
allowing you to group high-bandwidth users on low-traffic segments and to
organize users from different LAN segments according to their need for
common resources and/or their use of individual protocols. You can also
improve traffic control at the edge of your network by separating traffic of
different protocol types. VLANs can also enhance your network security by
creating separate subnets to help control in-band access to specific network
resources.
default VLAN with
VID = 1
thru 1-27
page 1-22
thru 1-27
page 1-28 page 1-43
page 1-27 page 1-43
1-2
General VLAN Operation
A VLAN is comprised of multiple ports operating as members of the same
subnet (broadcast domain). Ports on multiple devices can belong to the same
VLAN, and traffic moving between ports in the same VLAN is bridged (or
“switched”). (Traffic moving between different VLANs must be routed.) A
static VLAN is an 802.1Q-compliant VLAN configured with one or more ports
that remain members regardless of traffic usage. (A dynamic VLAN is an
802.1Q-compliant VLAN membership that the switch temporarily creates on
a port to provide a link to another port in the same VLAN on another device.)
This chapter describes static VLANs configured for port-based or protocolbased operation. Static VLANs are configured with a name, VLAN ID number
(VID), and port members. (For dynamic VLANs, refer to chapter 2, “GVRP” .)
By default, the switches covered in this guide are 802.1Q VLAN-enabled and
allow up to 2048 static and dynamic VLANs. (The default static VLAN setting
is 256). 802.1Q compatibility enables you to assign each switch port to multiple
VLANs, if needed.
Static Virtual LANs (VLANs)
Introduction
Types of Static VLANs Available in the Switch
Port-Based VLANs
This type of static VLAN creates a specific layer-2 broadcast domain comprised of member ports that bridge IPv4 traffic among themselves. Port-Based
VLAN traffic is routable on the switches covered in this guide.
Protocol-Based VLANs
This type of static VLAN creates a layer-3 broadcast domain for traffic of a
particular protocol, and is comprised of member ports that bridge traffic of
the specified protocol type among themselves. Some protocol types are
routable on the switches covered in this guide. Refer to table 1-1 on page 1-5.
Designated VLANs
The switch uses these static, port-based VLAN types to separate switch
management traffic from other network traffic. While these VLANs are not
limited to management traffic only, they can provide improved security and
availability for management traffic.
■The Default VLAN: This port-based VLAN is always present in the switch
and, in the default configuration, includes all ports as members (page 1-
49).
■The Primary VLAN: The switch uses this port-based VLAN to run certain
features and management functions, including DHCP/Bootp responses
for switch management. In the default configuration, the Default VLAN is
also the Primary VLAN. However, you can designate another, port-based,
non-default VLAN, as the Primary VLAN (page 1-49).
■The Secure Management VLAN: This optional, port-based VLAN estab-
lishes an isolated network for managing the HP switches that support this
feature. Access to this VLAN and to the switch’s management functions
are available only through ports configured as members (page 1-50).
■Voice VLANs: This optional, port-based VLAN type enables you to sepa-
rate, prioritize, and authenticate voice traffic moving through your network, and to avoid the possibility of broadcast storms affecting VoIP
(Voice-over-IP) operation (page 1-58).
1-3
Static Virtual LANs (VLANs)
Terminology
NoteIn a multiple-VLAN environment that includes some older switch models there
may be problems related to the same MAC address appearing on different
ports and VLANs on the same switch. In such cases the solution is to impose
some cabling and VLAN restrictions. For more on this topic, refer to “Multiple
VLAN Considerations” on page 1-17.
Terminology
Dynamic VLAN: An 802.1Q VLAN membership temporarily created on a port
linked to another device, where both devices are running GVRP. (See also
Static VLAN.) For more information, refer to chapter 2, “GVRP” .
Static VLAN: A port-based or protocol-based VLAN configured in switch
memory. (See also Dynamic VLAN.)
Tagged Packet: A packet that carries an IEEE 802.1Q VLAN ID (VID), which
is a two-byte extension that precedes the source MAC address field of an
ethernet frame. A VLAN tag is layer 2 data and is transparent to higher
layers.
1-4
Tagged VLAN: A VLAN that complies with the 802.1Q standard, including
priority settings, and allows a port to join multiple VLANs. (See also
Untagged VLAN.)
Untagged Packet: A packet that does not carry an IEEE 802.1Q VLAN ID
(VID).
Untagged VLAN: A VLAN that does not use or forward 802.1Q VLAN tagging,
including priority settings. A port can be a member of only one untagged
VLAN of a given type (port-based and the various protocol-based types).
(See also Tagged VLAN.)
VID: The acronym for a VLAN Identification Number. Each 802.1Q-compliant
VLAN must have its own unique VID number, and that VLAN must be given
the same VID in every device in which it is configured.
Static VLAN Operation
A group of networked ports assigned to a VLAN form a broadcast domain that
is separate from other VLANs that may be configured on the switch. On a given
switch, packets are bridged between source and destination ports that belong
to the same VLAN. Thus, all ports passing traffic for a particular subnet
address should be configured to the same VLAN. Cross-domain broadcast
traffic in the switch is eliminated and bandwidth is saved by not allowing
packets to flood out all ports.
Table 1-1. Comparative Operation of Port-Based and Protocol-Based VLANs
Port-Based VLANsProtocol-Based VLANs
IP
Addressing
Usually configured with at least one unique IP
address. You can create a port-based VLAN without an IP address. However, this limits the switch
features available to ports on that VLAN. (Refer to
“How IP Addressing Affects Switch Operation” in
the chapter “Configuring IP Addressing” in the
Basic Operation Guide.)
You can also use multiple IP addresses to create
multiple subnets within the same VLAN. (For more
on this topic, refer to the chapter on “Configuring
IP Addressing” in the Baic Operation Guide.)
You can configure IP addresses on all protocol
VLANs. However, IP addressing is used only on IPv4
and IPv6 protocol VLANs.
Restrictions: When you configure an IP address on
a VLAN interface, the following restrictions apply:
Loopback interfaces share the same IP address
space with VLAN configurations. The maximum
number of IP addresses supported on a switch is
2048, which includes all IP addresses configured
for both VLANs and loopback interfaces (except
for the default loopback IP address 127.0.0.1).
Each IP address that you configure on a VLAN
interface must be unique in the switch. This
means that the address cannot be used by a VLAN
interface or another loopback interface.
For more information, refer to the chapter on
“Configuring IP Addressing” in the Basic Operation Guide.
Static Virtual LANs (VLANs)
Static VLAN Operation
1-5
Static Virtual LANs (VLANs)
Static VLAN Operation
Port-Based VLANsProtocol-Based VLANs
Untagged
VLAN
Membership
Tagged VLAN
Membership
RoutingThe switch can internally route IP (IPv4) traffic
Commands
for
Configuring
Static VLANs
A port can be a member of one untagged, portbased VLAN. All other port-based VLAN
assignments for that port must be tagged.
A port can be a tagged member of any port-based
VLAN. See above.
between port-based VLANs and between portbased and IPv4 protocol-based VLANs if the switch
configuration enables IP routing.
If the switch is not configured to route traffic
internally between port-based VLANs, then an
external router must be used to move traffic
between VLANs.
A port can be an untagged member of one protocol
VLAN of a specific protocol type (such as IPX or IPv6).
If the same protocol type is configured in multiple
protocol VLANs, then a port can be an untagged
member of only one of those protocol VLANs. For
example, if you have two protocol VLANs, 100 and
200, and both include IPX, then a port can be an
untagged member of either VLAN 100 or VLAN 200,
but not both VLANs.
A port’s untagged VLAN memberships can include up
to four different protocol types. This means that a port
can be an untagged member of one of the following:
• Four single-protocol VLANs
• Two protocol VLANs where one VLAN includes a
single protocol and the other includes up to three
protocols
• One protocol VLAN where the VLAN includes four
protocols
A port can be a tagged member of any protocolbased VLAN. See above.
If the switch configuration enables IP routing, the
switch can internally route IPv4 traffic as follows:
• Between multiple IPv4 protocol-based VLANs
• Between IPv4 protocol-based VLANs and portbased VLANs.
Other protocol-based VLANs require an external
router for moving traffic between VLANs.
Note: NETbeui and SNA are non-routable protocols.
End stations intended to receive traffic in these
protocols must be attached to the same physical
network.
VID > protocol < ipx | ipv4 | ipv6 | arp |
appletalk | sna | netbeui >
vlan <
VID > [ tagged | untagged < [e] port-list >]
1-6
VLAN Environments
You can configure different VLAN types in any combination. Note that the
default VLAN will always be present. (For more on the default VLAN, refer to
“VLAN Support and the Default VLAN” on page 1-49.)
Table 1-2. VLAN Environments
VLAN 1
A2
A3
A4
A7
A6
A5
A1
A8
VLAN EnvironmentElements
The default VLAN (port-based;
VID of “1”) Only
In the default VLAN configuration, all ports belong to VLAN
1 as untagged members.
VLAN 1 is a port-based VLAN, for IPv4 traffic.
Static Virtual LANs (VLANs)
Static VLAN Operation
Multiple VLAN EnvironmentIn addition to the default VLAN, the configuration can include
one or more other port-based VLANs and one or more
protocol VLANs. (The switches covered in this guide allow
up to 2048 (vids up to 4094) VLANs of all types.) Using VLAN
tagging, ports can belong to multiple VLANs of all types.
Enabling routing on the switch enables the switch to route
IPv4 traffic between port-based VLANs and between portbased VLANs and IPv4 protocol VLANs. Routing other types
of traffic between VLANs requires an external router
capable of processing the appropriate protocol(s).
VLAN Operation
The Default VLAN. In figure 1-1, all ports belong to the default VLAN, and
devices connected to these ports are in the same broadcast domain. Except
for an IP address and subnet, no configuration steps are needed.
Figure 1-1. Example of a Switch in the Default VLAN Configuration
Multiple Port-Based VLANs. In figure 1-2, routing within the switch is
disabled (the default). This means that communication between any routable
VLANs on the switch must go through the external router. In this case, VLANs
“W” and “X” can exchange traffic through the external router, but traffic in
VLANs “Y” and “Z” is restricted to the respective VLANs. Note that VLAN 1,
the default VLAN, is also present, but not shown. (The default VLAN cannot
be deleted from the switch. However, ports assigned to other VLANs can be
removed from the default VLAN, if desired.) If internal (IP) routing is enabled
1-7
Static Virtual LANs (VLANs)
External
Router
Switch with Multiple
VLANs Configured
and Internal Routing
Disabled
A2
A3
A4
A7
A6
A5
A1
A8
VLAN Z
VLAN Y
VLAN X
VLAN W
Static VLAN Operation
on the switch, then the external router is not needed for traffic to move
between port-based VLANs.
Figure 1-2. Example of Multiple VLANs on the Switch
Protocol VLAN Environment. Figure 1-2 can also be applied to a protocol
VLAN environment. In this case, VLANs “W” and “X” represent routable
protocol VLANs. VLANs “Y” and “Z” can be any protocol VLAN. As noted for
the discussion of multiple port-based VLANs, VLAN 1 is not shown. Enabling
internal (IP) routing on the switch allows IP traffic to move between VLANs
on the switch. However, routable, non-IP traffic always requires an external
router.
1-8
Routing Options for VLANs
Table 1-3. Options for Routing Between VLAN Types in the Switch
PortBased
Port-BasedYes—Yes—————
Protocol
IPX—Yes
IPX IPv4 IPv6 ARP Apple
-Talk
1
———— ——
IP v4Yes—Yes—————
1
IPv6———Yes
ARP————Yes
AppleTalk —————Yes
—— ——
1
—— —
1
2
SNA
Netbeui
——
2
Loading...
+ 430 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.