An Alcatel service agreement brings your company the assurance of 7x24 no-excuses technical
support. You’ll also receive regular software updates to maintain and maximize your Alcatel
product’s features and functionality and on-site hardware replacement through our global network
of highly qualified service delivery partners. Additionally, with 24-hour-a-day access to Alcatel’s
Service and Support web page, you’ll be able to vi ew and update any case (open or clos ed) that you
have reported to Alcatel’s technical support, open a new case or access helpful release notes,
technical bulletins, and manuals. For more information on Alcatel’s Service Programs, see our web
page at www.ind.alcatel.com, call us at 1-800-995-2696, or email us at support@ind.alcatel.com.
This Manual documents Alcatel 6200 hardware and software.
The functionality described in this Manual is subject to change without notice.
Copyright
reproduced in whole or in part without the express written permission of Alcatel Internetworking, Inc.
Alcatel
OmniSwitch
SwitchExpert
are trademarks of their respective companies.
2007 by Alcatel Internetworking, Inc. All rights reserved. This document may not be
®
and the Alcatel logo are registered trademarks of Compagnie Financiére Alcatel, Paris, France.
®
and OmniStack® are registered trademarks of Alcatel Internetworking, Inc. Omni Switch/Router™,
SM
, the Xylan logo are trademarks of Alcatel Internetworking, Inc. All other brand and product names
26801 West Agoura Road
Calabasas, CA 91301
(818) 880-3500 FAX (818) 880-3505
info@ind.alcatel.com
US Customer Support-(800) 995-2696
International Customer Support-(818) 878-4507
Internet-http://eservice.ind.alcatel.com
Warning
This equipment has been tested and found to comply with the limits for Class A digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency energy and,
if not installed and used in accordance with the instructions in this guide, may cause interference to
radio communications. Operation of this equipment in a residential area is likely to cause interference,
in which case the user will be required to correct the interference at his own expense.
The user is cautioned that changes and modifications made to the equipment without
approval of the manufacturer could void the user’s authority to operate this equipment. It is suggested
that the user use only shielded and grounded cables to ensure compliance with FCC Rules.
This digital apparatus does not exceed the Class A limits for radio noise emissions from
digital apparatus set out in the radio interference regulations of the Canadian department of
communications.
Le present appareil numerique níemet pas de bruits radioelectriques depassant les limites applicables
aux appareils numeriques de la Class A prescrites dans le reglement sur le brouillage radioelectrique
edicte par le ministere des communications du Canada.
Utilice sólo adaptadores con las siguientes características eléctricas y que estén debidamente
certificados de acuerdo a la legislación vigente. El uso de otros adaptadores podría dañar el dispositivo
y anular la garantía además de provocar riesgos al usuario.
OS-LS-6224PAC100/115/220/230V; 50/60Hz; 2.0/1.7/0.9/
OS-LS-6248PAC100/115/220/230V; 50/60Hz; 4.0/3.4/1.8/
OS-LS-6224 AC 100/115/220/230V; 50/60Hz; 0.4/0.4/0.2/
OS-LS-6248 AC100/115/220/230V; 50/60Hz; 0.6/0.6/0.4/
OS-LS-6224U AC 100/115/220/230V 50/60Hz 1.0/1.0/0.5/
Adaptador:
OS-LS-6224POS-LS-62BP-P3Y Power
OS-LS-6248POS-LS-62BP-PAlcatel
OS-LS-6248 OS-LS-62BP-DC & OS-LS-62BPAccton & 3Y Power
OS-LS-6224 OS-LS-62BP-DC & OS-LS-62BPAccton & 3Y Power
Características de entrada:Características de salida:
0.9A; Clase I
1.8A; Clase I
0.2A; Clase I
0.4A; Clase I
0.5A Clase I
Modelo:Marca comercial:
DC 12V, 4.0A; -50V, 3.6A
DC 12V, 7.5A; -50V, 7.5A
DC 12V, 4.5A
DC 12V, 4.5A
DC 12V , 4.5A
Contents
Contents
Chapter 1: Introduction 1
Key Features ........................................................................................................1
Description of Software Features .........................................................................3
System Defaults .............................................................. ... ................................. .9
Chapter 2: Initial Configuration 13
General Configuration Information .....................................................................14
Auto-Negotiation 15
Device Port Default Settings 15
Booting the Switch ..............................................................................................16
Stacking Members and Unit ID 38
Removing and Replacing Stacking Members 39
Exchanging Stacking Members 40
Switching between the Stacking Master and the Secondary Master 40
Configuring Stacking 41
Resetting the Stack 42
Managing System Logs ......................................................................................43
Enabling System Logs 43
Viewing Memory Logs 45
Viewing the Device FLASH Logs 47
Remote Log Configuration 48
Polling for Unicast Time Information 51
Polling for Anycast Time Information 51
Polling For Broadcast Time Information 52
Defining SNTP Global Settings 52
Defining SNTP Authentication 53
Defining SNTP Servers 54
Defining SNTP Interface Settings 56
Configuring System Time ...................................................................................57
Configuring Daylight Savings Time 57
Managing System Files ......................................................................................61
Downloading System Files 62
Uploading System Files 64
Copying Files 65
Viewing RMON Statistics 118
Defining RMON History Control 120
Viewing the RMON History Table 121
Defining RMON Events Control 124
Viewing the RMON Events Logs 125
Defining RMON Alarms 126
Defining LLDP Port Settings 132
Defining Media Endpoint Discovery Network Policy 133
Defining LLDP MED Port Settings 134
Viewing the LLDP Neighbor Information 135
Viewing Neighbor Information Details 136
Defining VLAN Groups ...................................... ... .. ..................................... .....213
Configuring MAC Based VLAN Groups 213
Configuring Subnet Based VLAN Groups 214
Configuring Protocol Based VLAN Groups 215
Mapping Groups to VLANs 216
Defining GARP 217
Defining GVRP 219
Viewing GVRP Statistics 220
Defining IGMP Snooping 223
Specifying Static Interfaces for a Multicast Group 225
Displaying Interfaces Attached to a Multicast Router 227
Configuring Multicast TV 228
Defining Multicast TV Membership 229
Configuring Triple Play .....................................................................................230
Configuring Quality of Service ..........................................................................231
Access Control Lists 232
Mapping to Queues 233
QoS Modes 234
Enabling QoS 235
Defining Global Queue Settings 236
Defining Bandwidth Settings 237
Configuring VLAN Rate Limit 239
Mapping CoS Values to Queues 240
Mapping DSCP Values to Queues 241
Defining Basic QoS Settings 242
Defining QoS DSCP Rewriting Settings 243
Defining QoS DSCP Mapping Settings 244
Defining QoS Class Maps 245
Defining Policies 246
Defining Tail Drop 248
Viewing the Policy Table 248
Viewing Policy Bindings 250
Chapter 4: Command Line Interface 253
Using the Command Line Interface ..................................................................253
lldp optional-tlv 333
lldp med enable 334
lldp med network-policy (global) 334
lldp med network-policy (interface) 335
lldp med location 335
clear lldp rx 336
show lldp configuration 337
show lldp med configuration 337
show lldp local 338
show lldp neighbors 340
interface ethernet 376
interface range ethernet 377
shutdown 378
description 379
speed 380
duplex 381
negotiation 382
flowcontrol 383
mdix 383
back-pressure 384
clear counters 385
set interface active 386
show interfaces advertise 386
show interfaces configuration 388
show interfaces status 390
xii
Contents
show interfaces description 392
show interfaces counters 392
port storm-control broadcast enable 395
port storm-control broadcast rate 396
show ports storm-control 397
ip igmp snooping (Global) 408
ip igmp snooping (Interface) 409
ip igmp snooping host-time-out 410
ip igmp snooping mrouter-time-out 410
ip igmp snooping leave-time-out 411
ip igmp snooping multicast-tv 412
ip igmp snooping querier enable 413
ip igmp snooping querier address 413
ip igmp snooping querier version 414
show ip igmp snooping mrouter 414
show ip igmp snooping interface 415
show ip igmp snooping groups 416
IP Addressing Commands ................................................................................418
ip address 418
ip address dhcp 419
ip default-gateway 420
show ip interface 421
arp 422
arp timeout 423
clear arp-cache 424
show arp 424
ip domain-lookup 425
ip domain-name 426
ip name-server 426
ip host 427
clear host 428
clear host dhcp 429
show hosts 429
test copper-port tdr 451
show copper-ports tdr 452
show copper-ports cable-length 452
show fiber-ports optical-transceiver 453
Port Channel Commands .................................................................................455
interface port-channel 455
interface range port-channel 455
channel-group 456
show interfaces port-channel 457
Port Monitor Commands ...................................................................................458
port monitor 458
show ports monitor 459
Power over Ethernet Commands ......................................................................460
power inline 460
power inline powered-device 461
power inline priority 462
power inline usage-threshold 462
power inline traps enable 463
show power inline 464
show rmon statistics 503
rmon collection history 505
show rmon collection history 506
show rmon history 507
rmon alarm 510
show rmon alarm-table 511
show rmon alarm 512
xv
Contents
rmon event 514
show rmon events 514
show rmon log 515
rmon table-size 517
stack reload 614
stack display-order 614
show stack 615
show users 617
show sessions 617
show system 618
show version 619
service cpu-utilization 620
show cpu utilization 6 21
Triple Play Commands .....................................................................................627
switchport customer vlan 627
switchport customer multicast-tv vlan 627
ip igmp snooping map cpe vlan 628
show ip igmp snooping cpe vlans 629
show ip igmp snooping interface 629
DHCP Snooping, IP Source Guard and ARP Inspection Commands ..............631
ip dhcp snooping 632
ip dhcp snooping vlan 633
ip dhcp snooping trust 634
ip dhcp information option allowed-untrusted 634
ip dhcp information option 635
ip dhcp snooping verify 635
ip dhcp snooping database 636
ip dhcp snooping database update-freq 636
ip dhcp snooping binding 637
clear ip dhcp snooping database 638
show ip dhcp snooping 638
show ip dhcp snooping binding 639
ip source-guard (global) 640
ip source-guard (interface) 640
ip source-guard binding 641
ip source-guard tcam retries-freq 642
ip source-guard tcam locate 643
show ip source-guard 643
show ip source-guard inactive 644
ip arp inspection 645
ip arp inspection vlan 646
ip arp inspection trust 646
ip arp inspection validate 647
xviii
Contents
ip arp inspection list create 648
ip mac 648
ip arp inspection list assign 649
ip arp inspection logging interval 650
show ip arp inspection 650
show ip arp inspection list 651
User Interface Commands ...................................................... ... ......................652
do 652
enable 653
disable 654
login 654
configure 655
exit (Configuration) 655
exit 656
end 657
help 657
terminal datadump 658
show history 659
show privilege 659
vlan database 662
vlan 663
default-vlan vlan 664
interface vlan 664
interface range vlan 665
name 666
map protocol protocols-group 666
switchport general map protocols-group vlan 667
switchport mode 668
switchport access vlan 669
switchport trunk allowed vlan 670
switchport trunk native vlan 671
switchport general allowed vlan 672
switchport general pvid 673
switchport general ingress-filtering disable 674
switchport general acceptable-frame-type tagged-only 675
switchport forbidden vlan 676
map mac macs-group 677
switchport general map macs-group vlan 677
map subnet subnets-group 678
switchport general map subnets-group vlan 679
switchport protected 680
ip internal-usage-vlan 681
show vlan 682
show vlan internal usage 683
xix
Contents
show interfaces switchport 684
switchport access multicast-tv vlan 687
show vlan protocols-groups 688
show vlan macs-groups 688
show vlan subnets-groups 689
show vlan multicast-tv 690
Web Server Commands ...................................................................................691
ip http server 691
ip http port 692
ip http exec-timeout 693
ip https server 693
ip https port 694
ip https exec-timeout 695
crypto certificate generate 695
crypto certificate request 6 96
crypto certificate import 698
ip https certificate 699
show crypto certificate mycertificate 699
show ip http 700
show ip https 701
• OS-LS-6212 –
combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports
full-duplex Gigabit stacking
• OS-LS-6212P –
standard-based Power over Ethernet, two Gigabit combo uplink ports (with SFP or 10/
100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking
• OS-LS-6224 – Ethernet based switch with 24 RJ-45 10/100Base-TX ports, two
Gigabit combo uplink ports (with SFP or 10/1 00/1000Base-TX interf aces) and two
ports full-duplex Gigabit stacking (optional DC power source)
• OS-LS-6224P – Ethernet based switch with 24 RJ-45 10/100Base-TX ports
providing standard-based Power over Ethernet, two Gigabit combo uplink ports
(with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit
stacking
• OS-LS-6248 – Ethernet based switch with 48 RJ-45 10/100Base-TX ports, two
Gigabit combo uplink ports (with SFP or 10/1 00/1000Base-TX interf aces) and two
ports full-duplex Gigabit stacking (optional DC power source)
• OS-LS-6248P – Ethernet based switch with 48 RJ-45 10/100Base-TX ports
providing standard-based Power over Ethernet, two Gigabit combo uplink ports
(with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit
stacking
• OS-LS-6224U – Ethernet based switch with 24 100Base-FX external SFP ports,
two Gigabit combo ports with assicuated Mini-GBIC slots or RJ-45 ports and two
1000Base-T stacking ports
All devices have a management port which is used for debuggi ng an d manag ement
purposes.
This switch provides a broad range of features for switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by t his
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Ethernet based switch with 12 RJ-45 10/100Base-TX ports, two Gigabit
Ethernet based switch with 12 RJ-45 10/100Base-TX ports providing
Key Features
FeatureDescription
Configuration Backup
and Restore
Backup to TFTP server
Table1-1. Key Features
1
Introduction
1
Table1-1. Key Features
FeatureDescription
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Web – HTTPS; Telnet – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1x
Access Control ListsSupports up to 1K IP or MAC ACLs
DHCP ClientSupported
DNS ServerSupported
Port ConfigurationSpeed, duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringOne or more ports mirrored to single analysis port
Port TrunkingSupports up to 8 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Static AddressUp to 16K MAC addresses in the forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Protocol
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based, or private VLANs GVRP
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
STP Root GuardPrevents devices outside the network core from being assigned the
STP BPDU GuardUsed as a security mechanism to protect the network from invalid configurations.
802.1x - MAC
Authentication
DHCP SnoopingExpands network security by providing a firewall security between untrusted
DHCP Option 82Enables to add information for the DHCP server on request.
IP Source Address
Guard
ARP InspectionClassic Address Resolution Protocol is a TCP/IP protocol that translates IP
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning
Trees (MSTP).
Differentiated Services Code Point (DSCP) and TCP/UDP Port
spanning tree root.
MAC authentication ensures that end-user stations meet security policies criteria,
and protects networks from viruses.
interfaces and DHCP servers.
Restricts IP traffic on non-routed, Layer 2 interfaces by f ilterin g traffic. This feature
is based on the DHCP snooping binding database and on manually configured IP
source bindings.
addresses into MAC addresses.
2
Description of Software Features
Table1-1. Key Features
FeatureDescription
LLDP-MEDIncreases network flexibility by allowing different IP systems to co-exist on a single
QoSSupports Quality of Service (QoS).
Multicast FilteringSupports IGMP snooping and query.
Power over EthernetEnables PoE support.
Multicast TV VLAN Supplies multicast transmissions to L2-isolated subscribers, without replicating the
IP Subnet-Based
VLANs
MAC-Based VLANsPackets are classified according to MAC address
Jumbo FramesSupport of mini jumbo frames allows forwarding of packets up to 1632 bytes.
QinQAllows network managers to add an additional tag to previously tagged packets
network.
multicast transmissions for each subscriber VLAN.
Packets are classified according to the packet’s source IP subnet in its IP header
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Port-based and protocol-based VLANs, plus support for
automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, T eln et or web browser . User names and pa sswords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based and MAC-based authentication is also supported via the IEEE 802.1x
protocol. This protocol uses the Extensible Authentication Protocol over LANs
(EAPOL) to request user credentials from the 802.1x client, and then verifies the
client’s right to access the network via an authentication server.
Other authentication options include HTTPS for secure management ac cess via t he
web, SSH for secure management access over a Telnet-e quivalent connection,
SNMP version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.
3
Introduction
1
MAC Address Capacity Support – The device supports up to 16K MAC
addresses. The device reserves specific MAC addresses for system use.
Self-Learning MAC Addresses – The device enables automatic MAC addresses
learning from incoming packets.
Automatic Aging for MAC Addresses – MAC addresses from which no traffic is
received for a given period are aged out. This prevents the Bridging Table from
overflowing.
Static MAC Entries – User defined static MAC entries are stored in the Bridging
Table, in addition to the Self Learned MAC addresses.
VLAN-Aware MAC-based Switching – Packets arriving from an unknown source
address are sent to the CPU. When source addresses are added to the Hardware Table, packets addressed to this address are then forwarded straight to
corresponding port.
MAC Multicast Support – Multicast service is a limited broadcast service, which
allows one-to-many and many-to-many connections for information distribut ion.
Layer 2 multicast service is where a single frame is address ed to a speci fic multicast
address, and copies of the frame transmitted to relevant all relevan t ports.
Address Resolution Protocol –
switches to inter-communicate using various routing protocols to discover network
topology and define Routing tables. Device Next-Hop MAC addresses are
automatically derived by ARP. This includes directly attached end systems. Users can
override and supplement this by defining additional ARP Table entries.
QinQ tagging – QinQ tagging allows network managers to add an additional tag to
previously tagged packets. Adding additional tags to the packets helps create more
VLAN space. The added tag provides an VLAN ID to each customer, this ensures
private and segregated network traffic.
Port Configuration – You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connecti ons. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buff er thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into o r out of the network. T r affic th at falls within t he rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using I EEE 802. 3ad Lin k Ag gregatio n
IP routing generally utilizes routers and Layer 3
4
Description of Software Features
Control Protocol (LACP). The additional ports dramatically increase the throughput
across any connection, and provide redundancy by taking over the load if a port in
the trunk should fail. The switch supports up to 6 trunks.
Broadcast Storm Control – Broadcast s uppress ion preve nts broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses – A st atic MAC address ca n be assigned to a specific inte rface on
this switch. Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will be
ignored and will not be written to th e a ddress table. Static addresses can be used to
provide network security by restricting access for a known host to a specific port.
STP BPDU Guard– Bridge Protocol Data Units (BPDU) Guard expands network
adminstrator’s ablility to enforce STP borders and maintain STP top ologies
realibility. BPDU is utilized when Fast Link ports is enabled and/or if the Spanning
Tree Protocol is disabled on ports. If a BPDU message is sent to a port on which
STP is disabled, BPDU Guard shuts down the port, and generates a SNMP
message.
STP Root Guard – Spanning Tree Root Guard is used to prevent an unauthorized
device from becoming the root of a spanning tree. Root guard functionality enables
detection and resolution of misconfigurations, while preventing loops or loss of
connectivity.
802.1x - MAC Authentication – MAC authentication like the 802.1X allows network
access to a device, for example, printers and IP phones, that do not have the 802.1X
supplicant capability. MAC authentication uses the MAC address of the connecting
device to grant or deny network access.
To support MAC authentication, the RADIUS authentication server maintains a
database of MAC addresses for devices that require access to th e netwo rk. In order
for the feature to be active, 802.1x must be in auto-mode.
User then can enable the MAC authentication feature in one of following modes:
• MAC Only – Where only MAC authentication is enabled
• MAC + 802.1x (In that case 802.1x takes precedence)
The feature can be enabled per port. The port must be a member of a guest VLAN
prior of activating the feature.
DHCP Snooping – DHCP Snooping expands network security by providing a
firewall security between untrusted interfaces and DHCP serv ers. By enabling
DHCP Snooping network administrators can identify between trusted interfaces
connected to end-users or DHCP Servers, and untrusted interface located beyond
the network firewall. DHCP Snooping creates and maintains a DHCP Snooping
Table which contains information received from untrusted packets. Interfaces are
untrusted if the packet is received from an interface from out side the network or from
a interface beyond the network firewall.
1
5
Introduction
1
DHCP Option 82 – DHCP server can insert information into DHCP requests. The
DHCP information is used to assign IP addresses to network interfaces.
IP Source Address Guard – IP source guard stops malignant network users from
using unallocated network IP addresses. IP Sou rce Guard ensures that only packet s
with an IP address stored in the DHCP Database are forwarded. IP address stored
in the DHCP Snooping Database are either statically configured by the network
administrator or are retrieved using DHCP. IP source guard can be enabled only on
DHCP snooping untrusted interface.
Dynamic ARP Inspection – ARP Inspection eliminates man-in-the-middle attacks,
where false ARP packets are inserted into the s ubnet. ARP req uests and responses
are inspected, and their MAC Address to IP Address binding is checked. Packets
with invalid ARP Inspection Bindings are logged and dro pped. Packet s are classified
as:
• Trusted — Indicates that the interface IP and MAC address are recognized, and
recorded in the ARP Inspec-tion List. Trusted packets are forward without ARP
Inspection.
• Untrusted — Indicates that the packet arrived fro m an interface that does no t have
a recognized IP and MAC addresses. The packet is checked for:
• Source MAC — Compares the packet’s source MAC address against the
sender’s MAC address in the ARP request. This check is performed on both
ARP requests and responses.
• Destination MAC — Compares the packet’s destination MAC address again st
the destination interface’s MAC address. This check is performed for ARP
responses.
• IP Addresses — Compares the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.25 5, a nd al l I P Multi cas t
addresses. If the packet’s IP address was not found in the ARP Inspection
List, and DHCP snooping is enabled for a VLAN, a search of the DHCP
Snooping Database is performed. If the IP address i s found the packet is valid,
and is forwarded. ARP inspection is performed only on untrusted interfaces.
LLDP - The Link Layer Discovery Protocol (LLDP) allows network managers to
troubleshoot and enhance network management by discovering and maintaining
network topologies over multi-vendor environments. LLDP discovers network
neighbors by standardizing methods for network devices to advertise themselves to
other system, and to store discovered information. Device discovery information
includes:
• Device Identification
• Device Capabilities
• Device Configuration
The advertising device transmits multiple advertisement message sets in a single
LAN packet. The multiple advertisement sets are sent in the packet Type Length
Val ue (TLV) field. LLDP devices must support chassis and port ID advertisement, as
well as system name, system ID, system description, and system capability
6
Loading...
+ 732 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.