cc/td/doc/product/rtrmgmt/cvparnt/cview
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Using VLAN & Bridge

Using VLAN & Bridge

The VLAN & Bridge application allows you to configure groups of ports independent of their physical location as a virtual LAN. This arrangement is called a logical grouping the logical group is called a virtual LAN (VLAN). Ports or groups of ports in a VLAN are called VLAN members. VLANs prevent traffic, including broadcasts and multicasts, from being propagated to members of other VLANs.

Switches are interconnected by the Inter-Switch Link (ISL) port so that VLAN traffic can cross multiple switches. A Layer-2 switch is basically a bridge. Both switches and bridges allow multiple ports to be active simultaneously.

Every VLAN has an equivalent bridge. Most of the configuration required for bridging is related to the spanning-tree algorithm, which allows the connected network topology to contain multiple physical paths between two stations but constrains the active topology to a single-span tree. If a port on one bridge fails, the other bridges can reconfigure the topology and switch traffic to new paths. A VLAN, therefore, can be considered equivalent to a bridged LAN.


Note If the spanning-tree algorithm is not enabled, no backup path exists to maintain bridge connectivity.

To start the VLAN & Bridge application from CiscoView, select Configure>device>VLAN & Bridge.

VLAN and Bridge

The main window for VLAN and bridging configuration is the VLAN & Bridge window. The VLAN & Bridge window contains information about the currently configured VLANs in the device.

TimeSaver You can drag-and drop a port directly into a VLAN. Click on the port in the device display, drag it onto the opened VLAN & Bridge Table, then drop in into one of the VLAN fields. The system automatically assigns the port to the designated VLAN.
Hints for Configuring VLAN and Bridge Information for the Device.

VLANs can be of 5 types: Ethernet, FDDI, Token Ring, FDDI Net, and TRNet.

Use the action buttons in the VLAN & Bridge window as follows:

Procedures

This section contains procedures for using the VTP-VLAN section tools.

Local Management Domain

The Local Management Domain window allows you to create a new VTP management domain and define the boundary of a defined VLAN or to modify or display the existing domain information.


Note You must provide a domain name to each VLAN to ensure the VLAN functions properly.

To create, modify, or display a management domain, perform the following steps:

Step 1 From the VLAN & Bridge, click Local Mgmt Domain. The VTP management Domain window opens.

Step 2 Enter information into (or review values in) the following fields:

Step 3 Click Modify to save the input and refresh the VLAN & Bridge window. If the device returns any errors during this operation, CiscoView displays the information.

Step 4 Repeat Steps 1 through 3 for each domain as required.

Step 5 Click Cancel to exit the window.

Create VLAN

The Create VLAN window allows you to create a new VLAN.

For additional information regarding the fields within the windows, click Help to access the online help.

To create a VLAN, perform the following steps:

Step 1 From the VLAN & Bridge table, click Create VLAN. The Create VLAN dialog box opens.


Note Although all the fields are shown in the dialog box, any field not appropriate for the VLAN type is grayed out.

Step 2 Enter values into the following fields:

VLAN Type (default is ethernet; other options are fddi, trcrf, fddiNet, or trbrf.)

For VLANs of type trBrf, you must create a net first, then use the Create VLAN window and select VLAN Type trCrf to create Token Ring VLANs inside the net. See Note below for more information.


Note The trCrf VLAN type is used for Token Ring VLANs made up of (at most) one transparently bridged LAN segment. The trbrf type is used for VLANs that represent the scope of many trCrf VLANs connected via a source routing bridge. The Token Ring trBrf type can be said to represent the bridged broadcast domain.

Step 3 Enter values into the following optional fields or leave the fields blank:


Note If your system is a Catalyst  5000 series switch, skip Steps 4 and 5 and proceed to Step 6. If your system is a Catalyst  3000 series switch, proceed to Step 4.

Perform Steps 4 and 5 only on Catalyst  3000 series switches loaded with Software Release 2.2(2) or later.

Step 4 From the VLAN & Bridge table, select the newly created VLAN and click Modify VLAN.

Step 5 Change the Preferred VLAN value to yes and click Apply.

Step 6 Use the drag and drop technique to assign the ports to the VLAN.

Step 7 Click Apply to save the input and refresh the VLAN & Bridge table. If the device returns any errors during this operation, CiscoView displays the information.

Step 8 Repeat Steps 1 through 3 and Steps 6 and 7 for each new VLAN on the Catalyst  5000 series switch, and Steps 1 through 7 for each new VLAN on the Catalyst  3000 series switch.

Step 9 Click Cancel to exit the window.

Delete VLAN

To delete a VLAN, perform the following steps:

Step 1 From the VLAN & Bridge table, select a VLAN, and click Delete. A confirmation window opens.


Note Removal of a VLAN deactivates all the ports in the VLAN.

Step 2 Click Apply to confirm the deletion of the VLAN or Cancel to exit the window. If deleted, the VLAN is removed from the device VLAN table.

Step 3 Click Cancel to exit the window.

Modify VLAN

To modify a VLAN, select a VLAN from the VLAN table and click Modify VLAN. A dialog box similar to the one for creating a VLAN appears.

For additional information on the fields in the windows, click Help to access the online help.

To modify a VLAN, perform the following steps:

Step 1 From the VLAN & Bridge table, select a VLAN and click Modify VLAN. A dialog box similar to the one for creating VLAN appears.

Step 2 Change the value(s) as appropriate and click Apply. If the device returns any errors during this operation, CiscoView displays the information.

Step 3 Click Cancel to exit the window.


hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.