HP VPN Firewall Appliances Network Management Configuration Guide

48
Task Command
Remarks
Display VLAN interface
information.
display interface [ vlan-interface ] [ brief [ down ] ]
[ | { begin | exclude | include } regular-expression ]
display interface vlan-interface vlan-interface-id
[ brief ] [ | { begin | exclude | include }
regular-expression ]
Available in any view.
Display hybrid ports or
trunk ports on the device.
display port { hybrid | trunk } [ | { begin | exclude |
include } regular-expression ]
Available in any view.
Port-based VLAN configuration example
Network requirements
As shown in Figure 30, Host A and Host C belong to Department A, and access the enterprise network
through different devices. Host B and Host D belong to Department B. They also access the enterprise
network through different devices.
To ensure communication security and avoid broadcast storms, VLANs are configured in the enterprise
network to isolate Layer 2 traffic of different departments. VLAN 100 is assigned to Department A, and
VLAN 200 is assigned to Department B.
Make sure hosts within the same VLAN can communicate with each other. Host A can communicate with
Host C, and Host B can communicate with Host D.
Figure 30 Network diagram
Configuration procedure
1. Configure Firewall A:
# Create VLAN 100, and assign port GigabitEthernet 0/1 to VLAN 100.
<FirewallA> system-view
[FirewallA] interface GigabitEthernet 0/1
[FirewallA-GigabitEthernet0/1] port link-mode bridge
[FirewallA-GigabitEthernet0/1]quit
[FirewallA] vlan 100
[FirewallA-vlan100] port gigabitethernet 0/1
[FirewallA-vlan100] quit
# Create VLAN 200, and assign port GigabitEthernet 0/2 to VLAN 200.
[FirewallA] interface GigabitEthernet 0/2
[FirewallA-GigabitEthernet0/2] port link-mode bridge
[FirewallA-GigabitEthernet0/2]quit