quickly exchanged.
Architecture of layer-3 Exchange Technology
A layer-3 switch is also called a route switch. A layer-3 switch can be considered as a model. It involves the layer-2 and layer-3 of the ISO Reference Model. As a switch, it has the same attributes as the second layer, and combines the advantages of the second layer switch and the third layer router into a flexible solution, it can provide line rate performance at all levels, so it has certain routing performance. This integration
called a route switch. A layer-3 switch can be considered as a model. It involves the layer-2 and layer-3 of the ISO Reference Model. As a switch, it has the same attributes as the second layer, and combines the advantages of the second layer switch and the third layer router into a flexible solution, it can provide line rate performance at all levels, so it has certain routing performance. This integration structure also introduces policy management attributes, which not only associate Layer 2
There are many things worth learning about the exchange technology. Here we mainly introduce the Analysis and Application of the Third-layer exchange technology. The third-layer switch is also called a routing switch. The third-layer switch can be seen as a model, it involves the second and third layers of the ISO Reference Model. As a switch, it has the same attributes as the second layer, and combines the advantages of the second layer switch and the third layer router into a flexible solution
certain routing performance. This integration structure also introduces policy management attributes, which not only associate Layer 2 with Layer 3, it also provides prioritized communication traffic processing, security, and a variety of other flexible functions, such as dynamic deployment of trunking, VPN and Intranet.
The interface layer includes all important LAN interfaces: 10/100 Mbit/s Ethernet, gibit Ethernet, FDDI, and ATM. The switching lay
Link AggregationThere are port aggregation and port bundling. The English name is porttrunking. The function isVswitchTo achieve load balancing. Avoid link congestion. Through configuration, You can bind two or four ports to forward data on specific ports to prevent packet loss when the forwarding rate of a single link is too low.
Advantages of Trunking: The price is low, and the performance is close to that of Gigabit Ethernet. You do not need to reW
is a trunk port, all VLAN traffic on the trunk port will be monitored.You can also adjust the filter VLAN parameters to only monitor the data traffic of the VLAN specified in the filter VLAN.
Destination Port -- the target port of the span SESSION (Monitoring Port-that is, the monitoring port)The monitoring port can only be a separate physical port. A monitoring port can only be used in one span session at the same time.The port does not participate in other layer-2 protocols, such as Layer 2 p
) # switchport access vlan 12 // place the access mode port in VLan 12
SW1 (config-if) # no shutdown // it is best to enable the port, just in case
SW1 (config-if) # exit
SW1 (config) # interface f0/4
SW1 (config-if) # switchport mode access
SW1 (config-if) # switchport access vlan 34 // place the access mode port in VLan 34
SW1 (config-if) # no shutdown // it is best to enable the port, just in case
SW1 (config-if) # exit
SW1 # show vlan brief
VLAN Name Status Ports
----------------------------
VLAN (Virtual Local area Network), which is built on the basis of Ethernet interaction technology, can divide the same physical network into multiple valn, or cross the physical network barrier, and divide users from different subnets into the same VLAN. Figure 2 is an example of a VLAN partition.
Figure 2
There are many ways to implement VLANs, and there are generally two types of VLAN partitioning based on switching devices:
L Switch-based port partitioning
L Extended Ethernet frame format
switch between each floor is connected to the P580 through a Gigabit Optical Fiber. Therefore, VLAN division is based on direct port division on the P580, set the optical fiber port connected to the P334T switch to the trunk line, so that multiple VLANs can be defined on the Cajun P334T switch at the same time, finally, layer-3 routing protocol is configured on the P580 to implement communication between VLANs.
Log on to P580 and enter the configuration mode to set the VLAN:
1. Create a VLAN: s
execution during the implementation of the project. If the contract is in conflict, the contractor should be urged to adjust the project schedule;12) Review the schedule of each sub-project stage prepared by the contractor, and supervise the contractor to adjust the schedule in time according to the changes in the actual environment;13) Review the engineering design and the contractor's equipment/materials list and procurement plan, and check and supervise its implementation.2, what is the core
computers can communicate, that is to say, from a functional and logical perspective, these computer networks have formed a large computer network, or the Internet, but also referred to as the Internet, interconnection network.Connecting networks to each other to use some intermediate devices (or intermediate systems), the term ISO is called a trunking (relay) system. Depending on the hierarchy of the trunking
Routers and switchesComputer networks are often connected by a number of different types of network interconnection. If several computer networks are physically connected and not able to communicate between them, then this "interconnection" is of little practical significance. So often when it comes to "interconnection", it has been hinted that these interconnected computers can communicate, that is to say, functionally and logically, these computer networks have formed a large computer network,
supports multi-VLAN aggregation, its VLAN encapsulation type has ISL (Cisco proprietary)/802.1q (dot1q))SW (CONFIG-IF) #switchport mode Dot1q-tunnel: Configures the switch interface for the tunnel interface (non-trunk) so that the trunk interface with the user switch forms an asymmetric link.SW (config-if) #spanning-tree postfast (Configure Postfast mode for the interface)SW (config) #spanning-tress postfast default (Fast interface configured for all interfaces)2. VTP domain: (VLAN
VLAN (virtual local area network), is based on the Ethernet interactive technology to build a fictitious network, can either divide the same physical network into multiple valn, can also cross the physical network barriers, users in different subnets to the same VLAN. Figure 2 is an example of a VLAN partition.
Figure 2
There are many ways to implement VLANs, based on the VLAN division of switching devices, there are generally two kinds:
• Switch-based port partitioning
• Extended Ethernet
100Give VLAN100 a name.3550 (Config-vlan) #name Renshibo3550 (Config-vlan) #int F0/133550 (config-if) #switchport mode access3550 (config-if) #switchport Access VLAN 1003550 (config-if) #spanning-tree portfastWhen do I need to configure portfast under the switch interface? Is it OK if you don't configure it here?%warning:portfast should only is enabled on ports connected to a singleHost. Connecting hubs, concentrators, switches, bridges, etc ... To thisinterface when Portfast is enabled, can ca
takes 15 seconds. So, if you're sure what you're going to connect to, you can terminate the process.
Ethernet Channel Configuration Test
The next process is a test of the Ethernet channel, which is bound to the switch port to provide more Ethernet connectivity. If one channel does not work, the Ethernet channel usually provides redundancy. This process uses the Port aggregation Protocol (PAGP), which takes about 15 seconds.
Trunk configuration test wired and wireless networks
Next, the swit
takes 15 seconds. So, if you're sure what you're going to connect to, you can terminate the process.
Ethernet Channel Configuration Test
The next process is a test of the Ethernet channel, which is bound to the switch port to provide more Ethernet connectivity. If one channel does not work, the Ethernet channel usually provides redundancy. This process uses the Port aggregation Protocol (PAGP), which takes about 15 seconds.
Trunk configuration test wired and wireless networks
Next, the swit
.
Because of the Trunking cables structure, multiple channels can be pulled into a group at the same time, which brings some benefits. Trunking cables are generally used in factories to connect to the Cabinet wiring board or to an out-of-the-box Optical Fiber Module. This reduces installation costs and ensures the quality of all terminals. Its structure makes channel management easier. The upgraded and depr
HTTP applications. The most common reason to use tunneling is to embed non-HTTP traffic in an HTTP connection so that traffic can pass through firewalls that allow only web traffic.
Use connect to create an HTTP tunnel.
Trunking (relay): is a simple HTTP proxy that does not fully comply with the HTTP specification. The relay is responsible for processing the portion of the connection that is established in HTTP, and then blind forw
Python Black Hat programming 3.4
A Virtual Local Area Network (VLAN) is a Virtual Network built based on the Ethernet interaction technology. It can divide a physical Network into multiple valns or overcome physical Network barriers, users in different subnets are allocated to the same VLAN. Figure 2 shows an example of VLAN division.
Figure 2
There are many ways to implement VLANs. VLAN division based on swap devices is generally divided into two types:
L vswitch-based port Division
L extended
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.