12.07.2015 Views

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13To create a protected VLAN, complete the following steps:1 From the Services menu, select New > Protected VLAN. The Protected VLAN window is displayed,as shown in Figure 188.Figure 188: Protected VLAN Window2 Edit the values in the Tag and Name fields for the protected VLAN.3 Select the EAPS ring(s) that will be used to protect this VLAN, and click Add.4 Click the Create Protected VLAN button to start the validation and deployment process.When you create a protected VLAN, the software performs the same validations as those for nonprotectedVLANs, and verifies that the ring ports used are configured on all the relevant EAPSdomains. See “Creating a VLAN” Step 8 to learn what validations are performed for non-protectedVLANs.Modifying Protected VLANs, VMANs, and BVLANsYou can modify the list of EAPS domains, the name, and the network name of protected VLANsVMANs and BVLANs.To modify a protected VLAN, or VMAN, complete the following steps:1 Click the VLAN tab.2 Find the network you want to modify in the Navigation Table. VMANs are denoted with the wordVMAN in the Services column. You can scan for VMANs more easily by clicking on the Servicesheading to group all the VMANs together.3 Look at the Device Details frame and verify that the selected network has the EAPS protection value“present.”4 Right-click the VLAN or VMAN and select Properties to display the Properties dialog (Figure 189).You can also select Properties from the File menu to display this dialog.Ridgeline <strong>Reference</strong> <strong>Guide</strong>255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!