GS1200-8 vlan behavior on incoming tagged frames
Hello. I want to buy the device in the title. Before that I would appreciate it if someone could help me understand the following expected behavior:
If I configure for example port 1 and 5 with vpid 10 and port 2 and 6 with vpid 20, it is my understanding that when a host connected to one of those ports sends an untagged frame, it is wrapped with the vlan id of the port so that a forwarding decision can be made, and only the ports with that same vpid will be able to see the packet (please correct me if I'm wrong).
However, let's say I connect a host with a vlan capable nic to port 1 and configure the host to send frames with tag 20 (different than the port's vpid), will the switch either:
1.reject the packets.
2. Remove the tag and put a tag for vlan 10, then proceed to forward to ports with vpid 10 only.
3. Accept the vlan tab of the packets and forward them to vlan 20 ports, even if the receiver port is not on that vlan.
Option 3 is dangerous for my use case and the behavior is not clear to me from reading the documentation.
Thanks.
Accepted Solution
-
Hi @Mihai123123123,
The latest firmware version of the GS 1200 enabled ingress check by default. Therefore, the answer is 1. Reject the packets. In addition, the ingress check function cannot be disabled.
Zyxel Melen0
All Replies
-
Hi @Mihai123123123,
The latest firmware version of the GS 1200 enabled ingress check by default. Therefore, the answer is 1. Reject the packets. In addition, the ingress check function cannot be disabled.
Zyxel Melen0 -
Thank you.
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 146 Nebula Ideas
- 96 Nebula Status and Incidents
- 5.7K Security
- 262 USG FLEX H Series
- 271 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.4K Consumer Product
- 249 Service & License
- 387 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.5K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 73 Security Highlight