Summary of the invention
The objective of the invention is to overcome deficiency of the prior art, provide a kind of and be applicable to that switch ports themselves is isolated and broadcast domain is isolated, help the network optimization and the technology that solves Communication Security Problem.
Technical scheme of the present invention is:
The port that is configured in the PVLAN territory is called the PVLAN port, in the PVLAN port, port is divided into two equivalence classes: shared port territory and isolated port territory; Wherein can free communication between the shared domain inner port, can free communication between the quarantine domain inner port, can mutual communication between quarantine domain port and the shared domain port, can not free communication between the port between the different quarantine domain;
VLAN among the PVLAN is divided into shared port territory and isolated port territory; Wherein all shared port territory ports must add shared port territory VLAN with the UNTAG mode, and the PVID of shared port territory port is shared port territory VLAN ID, and all isolated port territory ports must add shared port territory VLAN with the UNTAG mode; All isolated port territory ports add isolated port territory VLAN with the UNTAG mode, and its PVID is quarantine domain VLAN ID, and all shared port territory ports add isolated port territory VLAN with the UNTAG mode.
The port of all tag attributes is the UNTAG pattern in inter-process, and the message of all these mouthfuls of flowing through all is regarded as UNTAG and handles.
A shared port territory can comprise one or more ports, and an isolated port territory can comprise one or more ports.
A switch can dispose one or more PVLAN groups.
A PVLAN group can comprise a shared port territory and a plurality of isolated ports territory.
The invention has the beneficial effects as follows: solved and converged the technical barrier that port vlan is isolated, realized the network optimization and solved Communication Security Problem.
Embodiment
Below in conjunction with accompanying drawing the present invention is done further description.
Fig. 1 has indicated PVLAN port territory division figure, and wherein VLAN 100 is the shared port territory, and VLAN200, VLAN300 are the isolated port territory.Require:
Can communicate by letter with isolated port territory 200 in shared port territory 100
Can communicate by letter with isolated port territory 300 in shared port territory 100
Can not communicate by letter with isolated port territory 300 in isolated port territory 200
In order to accomplish above-mentioned functions, at first dispose shared port territory 100;
1, VLAN100 configuration;
(1). create VLAN 100
#kyland(config)#vlan?100
(2). add the UNTAG port
#kyland(config-vlan-100)#add?port?1?UNTAG?priority?1
#kyland(config-vlan-100)#add?port?2?UNTAG?priority?1
(3). add the Tag port
#kyland(config-vlan-100)#add?port?3?tag?pvlan?enable
#kyland(config-vlan-100)#add?port?4?tag?pvlan?enable
#kyland(config-vlan-100)#add?port?5?tag?pvlan?enable
#kyland(config-vlan-100)#add?port?6?tag?pvlan?enable
2, VLAN200 configuration;
(1). create VLAN 200
#kyland(config)#vlan?200
(2). add the UNTAG port
#kyland(config-vlan-200)#add?port?3?UNTAG?priority?1
#kyland(config-vlan-200)#add?port?4?UNTAG?priority?1
(3). add the Tag port
#kyland(config-vlan-200)#add?port?1?tag?pvlan?enable
#kyland(config-vlan-200)#add?port?2?tag?pvlan?enable
3.VLAN300 configuration;
(1). create VLAN 300
#kyland(config)#vlan?300
(2). add the UNTAG port
#kyland(config-vlan-300)#add?port?5?UNTAG?priority?1
#kyland(config-vlan-300)#add?port?6?UNTAG?priority?1
(3). add the Tag port
#kyland(config-vlan-300)#add?port?1?tag?pvlan?enable
#kyland(config-vlan-300)#add?port?2?tag?pvlan?enable
(4). add the VLAN that creates to PVLAN
#kyland(config)#pvlan?add?100
#kyland(config)#pvlan?add?200
#kyland(config)#pvlan?add?300
So far Pvlan configuration is accomplished, and can get a desired effect.
Configuration instruction:
Then when joining this VLAN among the PVLAN, the port of all tag attributes is the UNTAG pattern in inter-process in the pvlan feature unlatching, and the message of all these mouthfuls of flowing through all is regarded as UNTAG and handles; Therefore the data of different VLAN can intercom mutually in shared domain and the quarantine domain; For quarantine domain and quarantine domain, when configuration tag port, it is not configured in the quarantine domain of different VLAN, so even message handle too and cannot communicate by letter with the UNTAG mode, thereby reach the purpose that quarantine domain can not be communicated by letter.
Fig. 2 has indicated the data flow figure between each territory of PVLAN, down in the face of every data flow with PVID set forth so that the darker realization mechanism of understanding PVLAN:
(1) VLAN100 is to the data flow of VLAN200, VLAN300;
As shown in the figure; The downlink data that is arrived VLAN200 and VLAN300 by VLAN100 via switch has been stamped the mark of PVID100 when the process switch; At switch TAG that internal data is with is 100; Owing to added among the VLAN100 with the TAG pattern respectively carrying out PVLAN when configuration 3.4.5.6 port, thus switches got into by 1.2 mouthfuls, and to be beaten PVID be that 100 packet can be forwarded to the 3.4.5.6. mouth through switch; Thereby reach the purpose that VLAN100 communicates by letter with VLAN200, VLAN300.
(2) VLAN200, VLAN300 are to the data flow of VLAN100;
The upstream data that gets into switch via port 3.4.5.6 by VLAN200, VLAN300 can be labeled as PVID200, PVID300 respectively after wrapping in and getting into switch inside; Because port one .2 has added VLAN200 and VLAN300 respectively with the TAG mode when configuration, the packet of mark can arrive port one .2 through the switch forwarding so get into also by the 3.4.5.6 port; Thereby reach the purpose that VLAN200, VLAN300 and VLAN100 communicate.
(3) VLAN200 is to the data flow of VLAN300;
Stamped the mark of PVID200 at the entering switch through the packet of port 3.4 arrival switches by VLAN200; Stamped the mark of PVID 300 at the entering switch through the packet of port 5.6 arrival switches by VLAN300; Because not common factor generation of 3.4.5.6 port when carrying out the PVLAN configuration; Therefore the packet of PVID 200 can not arrive the port territory of PVID 300 through the forwarding of switch; In like manner, the packet of PVID300 can not arrive the port territory of PVID200 through the forwarding of switch; Thereby reached the purpose that to communicate by letter between the quarantine domain.
The above is merely process of the present invention and method embodiment, in order to restriction the present invention, all any modifications of within spirit of the present invention and essence, being made, is not equal to replacement, improvement etc., all should be included within the protection range of the present invention.