Contents
xv
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Private-VLAN Configuration Guidelines 15-7
Secondary and Primary VLAN Configura tion 15-7
Private-VLAN Port Configuration 15-8
Limitations with Other Features 15-9
Configuring and Associating VLANs in a Private VLAN 15-10
Configuring a Layer 2 Interface as a Private-VLAN Host Port 15-11
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port 15-13
Mapping Secondary VLANs to a Primary VL AN Layer 3 VLAN Interface 15-14
Monitoring Private VLANs 15-15
CHAPTER
16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling 16-1
Understanding IEEE 802.1Q Tunneling 16-1
Configuring IEEE 802.1Q Tunneling 16-4
Default IEEE 802.1Q Tunneling Configuration 16-4
IEEE 802.1Q Tunneling Configuration Guidelines 16-4
Native VLANs 16-4
System MTU 16-5
IEEE 802.1Q Tunneling and Other Features 16-6
Configuring an IEEE 802.1Q Tunneling Port 16-6
Understanding Layer 2 Protocol Tunneling 16-7
Configuring Layer 2 Protocol Tunneling 16-10
Default Layer 2 Protocol Tunneling Configuration 16-11
Layer 2 Protocol Tunneling Configuration Guidelines 16-12
Configuring Layer 2 Protocol Tunneling 16-13
Configuring Layer 2 Tunneling for EtherChannels 16-14
Configuring the SP Edge Switch 16-14
Configuring the Customer Switch 16-16
Monitoring and Maintaining Tunneling Status 16-18
CHAPTER
17 Configuring STP 17-1
Understanding Spanning-Tree Features 17-1
STP Overview 17 -2
Spanning-Tree Topology and BPDUs 17-3
Bridge ID, Switch Priority, and Extended System ID 17-4