
4
15.3.1 Introduction to Dot1q-tunnel.............................................................................................. 15-11
15.3.2 Dot1q-tunnel Configuration............................................................................................... 15-12
15.3.3 Typical Applications of the Dot1q-tunnel...........................................................................15-12
15.3.4 Dot1q-tunnel Troubleshooting...........................................................................................15-13
15.4 VLAN-TRANSLATION CONFIGURATION............................................................................................ 15-14
15.4.1 Introduction to VLAN-translation....................................................................................... 15-14
15.4.2 VLAN-translation Configuration ........................................................................................15-14
15.4.3 Typical application of VLAN-translation ............................................................................15-15
15.4.4 VLAN-translation Troubleshooting ....................................................................................15-16
15.5 DYNAMIC VLAN CONFIGURATION................................................................................................... 15-16
15.5.1 Introduction to Dynamic VLAN..........................................................................................15-16
15.5.2 Dynamic VLAN Configuration ........................................................................................... 15-16
15.5.3 Typical Application of the Dynamic VLAN.........................................................................15-18
15.5.4 Dynamic VLAN Troubleshooting....................................................................................... 15-19
15.6 VOICE VLAN CONFIGURATION ....................................................................................................... 15-20
15.6.1 Introduction to Voice VLAN...............................................................................................15-20
15.6.2 Voice VLAN Configuration.................................................................................................15-20
15.6.3 Typical Applications of the Voice VLAN ............................................................................15-21
15.6.4 Voice VLAN Troubleshooting ............................................................................................15-22
CHAPTER 16 MAC TABLE CONFIGURATION.............................................................16-1
16.1 INTRODUCTION TO MAC TABLE........................................................................................................ 16-1
16.1.1 Obtaining MAC Table .......................................................................................................... 16-1
16.1.2 Forward or Filter..................................................................................................................16-2
16.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST............................................................................ 16-3
16.3 TYPICAL CONFIGURATION EXAMPLES ............................................................................................... 16-4
16.4 MAC TABLE TROUBLESHOOTING ..................................................................................................... 16-5
16.5 MAC ADDRESS FUNCTION EXTENSION............................................................................................. 16-5
16.5.1 MAC Address Binding.........................................................................................................16-5
CHAPTER 17 MSTP CONFIGURATION........................................................................17-1
17.1 INTRODUCTION TO MSTP................................................................................................................. 17-1
17.1.1 MSTP Region...................................................................................................................... 17-1
17.1.2 Port Roles............................................................................................................................ 17-3
17.1.3 MSTP Load Balance ........................................................................................................... 17-3
17.2 MSTP CONFIGURATION TASK LIST................................................................................................... 17-3
17.3 MSTP EXAMPLE.............................................................................................................................. 17-7
17.4 MSTP TROUBLESHOOTING ............................................................................................................ 17-11
CHAPTER 18 QOS CONFIGURATION..........................................................................18-1
18.1 INTRODUCTION TO QOS ................................................................................................................... 18-1
18.1.1 QoS Terms .......................................................................................................................... 18-1