Dell Networking N-Series
N1500, N2000, N3000, and
N4000 Switches
User’s Configuration
Guide
Version 6.3.0.0 and Later
Regulatory Models: N1524, N1524P,
N1548, N1548P, N2024, N2024P, N2038,
N2048P, N3024, N3024F, N3024P, N 3048,
N3048P, N4032, N4032F, N4064, N4064F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
Copyright © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international
copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the
United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies.
Regulatory Models: N1524, N1524P, N1548, N1548P, N2024, N2024P, N2038, N2048P, N3024, N3024F, N3024P, N3048, N3048P, N4032,
N4032F, N4064, N4064F
January 2016 Rev. A02
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 55
About This Document . . . . . . . . . . . . . . . . . . 55
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 55
Document Conventions
Additional Documentation
. . . . . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . 56
2 Switch Feature Overview . . . . . . . . . . . . 57
System Management Features . . . . . . . . . . . . . 58
Multiple Management Options
System Time Management . . . . . . . . . . . . . 58
Log Messages
. . . . . . . . . . . . . . . . . . . 59
Integrated DHCP Server
Management of Basic Network Information . . . . 59
IPv6 Management Features
Dual Software Images
File Management . . . . . . . . . . . . . . . . . . 60
Switch Database Management Templates
Automatic Installation of Firmware and
Configuration . . . . . . . . . . . . . . . . . . . . 61
sFlow
. . . . . . . . . . . . . . . . . . . . . . . . 62
SNMP Alarms and Trap Logs
CDP Interoperability Through ISDP . . . . . . . . 63
Remote Monitoring (RMON)
N3000 Series Access and Aggregation
Firmware Images . . . . . . . . . . . . . . . . . . 63
. . . . . . . . . . . 58
. . . . . . . . . . . . . . 59
. . . . . . . . . . . . 60
. . . . . . . . . . . . . . . 60
. . . . 61
. . . . . . . . . . . . 62
. . . . . . . . . . . . 63
Contents 3
Stacking Features . . . . . . . . . . . . . . . . . . . . 65
High Stack Count
Single IP Management
. . . . . . . . . . . . . . . . . . 65
. . . . . . . . . . . . . . . 65
Master Failover with Transparent Transition. . . . 65
Nonstop Forwarding on the Stack
. . . . . . . . . 66
Hot Add/Delete and Firmware
Synchronization. . . . . . . . . . . . . . . . . . . 66
Security Features . . . . . . . . . . . . . . . . . . . . 67
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 67
Profiles
Password-Protected Management Access
Strong Password Enforcement
. . . . . . . . . . . 67
. . . . 67
TACACS+ Client . . . . . . . . . . . . . . . . . . . 67
RADIUS Support
SSH/SSL
. . . . . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . . . . . . . . . 68
Inbound Telnet Control . . . . . . . . . . . . . . . 68
Denial of Service
Port Protection
Captive Portal
802.1X Authentication (IEEE 802.1X)
. . . . . . . . . . . . . . . . . . 68
. . . . . . . . . . . . . . . . . . . 69
. . . . . . . . . . . . . . . . . . . . 70
. . . . . . . . 70
MAC-Based 802.1X Authentication . . . . . . . . . 71
802.1X Monitor Mode
MAC-Based Port Security
. . . . . . . . . . . . . . . . 71
. . . . . . . . . . . . . 71
Access Control Lists (ACLs) . . . . . . . . . . . . 72
Time-Based ACLs
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . . . . 72
. . . . . . . . . . . . . . . 72
DHCP Snooping . . . . . . . . . . . . . . . . . . . 73
Dynamic ARP Inspection
Protected Ports (Private VLAN Edge)
. . . . . . . . . . . . . . 73
. . . . . . . . 73
4 Contents
Green Technology Features
Energy Detect Mode
Energy Efficient Ethernet
. . . . . . . . . . . . . . . 74
. . . . . . . . . . . . . . . . 74
. . . . . . . . . . . . . . 74
Power Utilization Reporting . . . . . . . . . . . . 74
Power over Ethernet (PoE) Plus Features
. . . . . . . . 75
Power Over Ethernet (PoE) Plus
Configuration
PoE Plus Support
. . . . . . . . . . . . . . . . . . . . 75
. . . . . . . . . . . . . . . . . . 75
UPOE Support. . . . . . . . . . . . . . . . . . . . 75
Switching Features . . . . . . . . . . . . . . . . . . . 76
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 76
Head of Line Blocking Prevention . . . . . . . . . 76
Alternate Store and Forward (ASF)
Jumbo Frames Support
. . . . . . . . . . . . . . . 76
. . . . . . . . . 76
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 77
VLAN-Aware MAC-based Switching
Back Pressure Support
. . . . . . . . . . . . . . . 77
. . . . . . . . 77
Auto-negotiation . . . . . . . . . . . . . . . . . . 77
Storm Control
Port Mirroring
. . . . . . . . . . . . . . . . . . . . 78
. . . . . . . . . . . . . . . . . . . . 78
Static and Dynamic MAC Address Tables . . . . . 78
Link Layer Discovery Protocol (LLDP)
. . . . . . . 79
Link Layer Discovery Protocol (LLDP) for
Media Endpoint Devices . . . . . . . . . . . . . . 79
Connectivity Fault Management
(IEEE 802.1ag)
. . . . . . . . . . . . . . . . . . . . 79
Priority-based Flow Control (PFC) . . . . . . . . . 79
Data Center Bridging Exchange (DBCx)
Protocol
. . . . . . . . . . . . . . . . . . . . . . . 80
Enhanced Transmission Selection . . . . . . . . . 80
Cisco Protocol Filtering
DHCP Layer-2 Relay
. . . . . . . . . . . . . . . 81
. . . . . . . . . . . . . . . . 81
Virtual Local Area Network Supported Features
VLAN Support
Port-Based VLANs
. . . . . . . . . . . . . . . . . . . . 82
. . . . . . . . . . . . . . . . . 82
. . . . 82
Contents 5
IP Subnet-based VLAN . . . . . . . . . . . . . . . 82
MAC-based VLAN
. . . . . . . . . . . . . . . . . . 82
IEEE 802.1v Protocol-Based VLANs. . . . . . . . . 82
GARP and GVRP Support
Voice VLAN
. . . . . . . . . . . . . . . . . . . . . 83
. . . . . . . . . . . . . . 82
Guest VLAN . . . . . . . . . . . . . . . . . . . . . 83
Unauthorized VLAN
Double VLANs
. . . . . . . . . . . . . . . . . 83
. . . . . . . . . . . . . . . . . . . . 83
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Port Settings
. . . . . . . . . . . . 84
. . . . . . . . . . . 84
. . . . . . . . . . . . 84
Rapid Spanning Tree . . . . . . . . . . . . . . . . 84
Multiple Spanning Tree
Bridge Protocol Data Unit (BPDU) Guard
BPDU Filtering
RSTP-PV and STP-PV
Link Aggregation Features
Link Aggregation
Link Aggregate Control Protocol (LACP)
. . . . . . . . . . . . . . . 84
. . . . . . 85
. . . . . . . . . . . . . . . . . . . 85
. . . . . . . . . . . . . . . . 85
. . . . . . . . . . . . . . . . 86
. . . . . . . . . . . . . . . . . . 86
. . . . . . 87
Multi-Switch LAG (MLAG) . . . . . . . . . . . . . 87
Routing Features . . . . . . . . . . . . . . . . . . . . . 88
Address Resolution Protocol (ARP) Table
Management
VLAN Routing
IP Configuration
. . . . . . . . . . . . . . . . . . . . 88
. . . . . . . . . . . . . . . . . . . . 88
. . . . . . . . . . . . . . . . . . . 88
Open Shortest Path First (OSPF) . . . . . . . . . . 88
Border Gateway Protocol (BGP)
Virtual Routing and Forwarding (VRF)
. . . . . . . . . . 89
. . . . . . . 89
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 90
IP Helper and UDP Relay . . . . . . . . . . . . . . 90
Routing Information Protocol . . . . . . . . . . . . 90
Router Discovery
. . . . . . . . . . . . . . . . . . 90
6 Contents
Routing Table . . . . . . . . . . . . . . . . . . . . 90
Virtual Router Redundancy Protocol (VRRP)
. . . . 91
Tunnel and Loopback Interfaces . . . . . . . . . . 91
IPv6 Routing Features . . . . . . . . . . . . . . . . . . 92
IPv6 Configuration
. . . . . . . . . . . . . . . . . 92
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 92
OSPFv3
. . . . . . . . . . . . . . . . . . . . . . . 92
DHCPv6
. . . . . . . . . . . . . . . . . . . . . . . 92
Quality of Service (QoS) Features
Differentiated Services (DiffServ)
Class Of Service (CoS)
. . . . . . . . . . . . 93
. . . . . . . . . 93
. . . . . . . . . . . . . . . 93
Auto Voice over IP (VoIP). . . . . . . . . . . . . . 93
Internet Small Computer System Interface
(iSCSI) Optimization
Layer-2 Multicast Features
MAC Multicast Support
IGMP Snooping
. . . . . . . . . . . . . . . . . 94
. . . . . . . . . . . . . . . 94
. . . . . . . . . . . . . . . 94
. . . . . . . . . . . . . . . . . . . 94
IGMP Snooping Querier . . . . . . . . . . . . . . 95
MLD Snooping
Multicast VLAN Registration
Layer-3 Multicast Features
. . . . . . . . . . . . . . . . . . . 95
. . . . . . . . . . . . 95
. . . . . . . . . . . . . . . 96
Distance Vector Multicast Routing Protocol
Internet Group Management Protocol
. . . . . . . 96
IGMP Proxy . . . . . . . . . . . . . . . . . . . . . 96
Protocol Independent Multicast—Dense
Mode
. . . . . . . . . . . . . . . . . . . . . . . . 96
Protocol Independent Multicast—Sparse
Mode . . . . . . . . . . . . . . . . . . . . . . . . 97
Protocol Independent Multicast—Source
Specific Multicast . . . . . . . . . . . . . . . . . 97
Protocol Independent Multicast IPv6 Support
MLD/MLDv2 (RFC2710/RFC3810)
. . . . . . . . . . 97
. . . . 96
. . . 97
Contents 7
3 Hardware Overview . . . . . . . . . . . . . . . . 99
Dell Networking N1500 Series Switch
Hardware. . . . . . . . . . . . . . . . . . . . . . . . . 99
Front Panel
Back Panel
LED Definitions . . . . . . . . . . . . . . . . . . 104
Power Consumption for PoE Switches
Dell Networking N2000 Series Switch
Hardware
Front Panel
Back Panel
LED Definitions . . . . . . . . . . . . . . . . . . 114
Power Consumption for PoE Switches
Dell Networking N3000 Series Switch
Hardware
Front Panel
Back Panel
LED Definitions . . . . . . . . . . . . . . . . . . 126
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . . . 99
. . . . . . . . . . . . . . . . . . . . 103
. . . . . . 107
. . . . . . . . . . . . . . . . . . . . . . . . 109
. . . . . . . . . . . . . . . . . . . . 109
. . . . . . . . . . . . . . . . . . . . 112
. . . . . . 117
. . . . . . . . . . . . . . . . . . . . . . . . 119
. . . . . . . . . . . . . . . . . . . . 119
. . . . . . . . . . . . . . . . . . . . 123
. . . . . . 130
8 Contents
Dell Networking N4000 Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 132
Front Panel
Back Panel
. . . . . . . . . . . . . . . . . . . . 132
. . . . . . . . . . . . . . . . . . . . 136
LED Definitions . . . . . . . . . . . . . . . . . . 138
Switch MAC Addresses . . . . . . . . . . . . . . . . 142
4 Using Dell OpenManage Switch
Administrator
About Dell OpenManage Switch Administrator . . . . 145
. . . . . . . . . . . . . . . . . . . . 145
Starting the Application
. . . . . . . . . . . . . . . . . 146
Understanding the Interface. . . . . . . . . . . . . . . 147
Using the Switch Administrator Buttons and Links
Defining Fields
. . . . . . . . . . . . . . . . . . . . . . 150
. . . 149
Understanding the Device View. . . . . . . . . . . . . 150
Using the Device View Port Features
. . . . . . . 150
Using the Device View Switch Locator
Feature . . . . . . . . . . . . . . . . . . . . . . . 151
5 Using the Command-Line Interface. . . . 153
Accessing the Switch Through the CLI . . . . . . . . . 153
Console Connection
Telnet Connection
Understanding Command Modes
Entering CLI Commands . . . . . . . . . . . . . . . . . 157
Using the Question Mark to Get Help
Using Command Completion . . . . . . . . . . . . 158
Entering Abbreviated Commands
Negating Commands
Command Output Paging . . . . . . . . . . . . . . 158
Understanding Error Messages
Recalling Commands from the History Buffer
. . . . . . . . . . . . . . . . 153
. . . . . . . . . . . . . . . . . 154
. . . . . . . . . . . . 155
. . . . . . . 157
. . . . . . . . . 158
. . . . . . . . . . . . . . . . 158
. . . . . . . . . . 159
. . . 159
Contents 9
6 Default Settings . . . . . . . . . . . . . . . . . . . 161
7 Setting the IP Address and Other
Basic Network Information
IP Address and Network Information Overview . . . 165
What Is the Basic Network Information?
Why Is Basic Network Information
Needed?. . . . . . . . . . . . . . . . . . . . . . 166
How Is Basic Network Information
Configured?
What Is Out-of-Band Management and
In-Band Management? . . . . . . . . . . . . . . 167
. . . . . . . . . . . . . . . . . . . . 167
. . . . . . . . . . 165
. . . . . 165
Default Network Information
. . . . . . . . . . . . . 169
Configuring Basic Network Information (Web) . . . . 171
Out-of-Band Interface
. . . . . . . . . . . . . . 171
IP Interface Configuration (Default VLAN
IP Address) . . . . . . . . . . . . . . . . . . . . 172
Route Entry Configuration (Switch Default
Gateway) . . . . . . . . . . . . . . . . . . . . . 174
Domain Name Server
Default Domain Name
. . . . . . . . . . . . . . . 176
. . . . . . . . . . . . . . 177
Host Name Mapping . . . . . . . . . . . . . . . 178
Dynamic Host Name Mapping
Configuring Basic Network Information (CLI)
Enabling the DHCP Client on the OOB Port
. . . . . . . . . . 179
. . . . . 180
. . . . 180
Enabling the DHCP Client on the Default
VLAN
. . . . . . . . . . . . . . . . . . . . . . . 180
Managing DHCP Leases . . . . . . . . . . . . . 181
Configuring Static Network Information on
the OOB Port
. . . . . . . . . . . . . . . . . . . 182
Configuring Static Network Information
on the Default VLAN
. . . . . . . . . . . . . . . 183
10 Contents
Configuring and Viewing Additional
Network Information . . . . . . . . . . . . . . . . 184
Basic Network Information Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 186
Configuring Network Information Using
the OOB Port
. . . . . . . . . . . . . . . . . . . . 186
Configuring Network Information Using the
Serial Interface
. . . . . . . . . . . . . . . . . . . 187
8 Managing QSFP Ports . . . . . . . . . . . . . . 191
9 Stacking. . . . . . . . . . . . . . . . . . . . . . . . . 193
Stacking Overview . . . . . . . . . . . . . . . . . . . 193
Dell Networking N1500, N2000, N3000,
and N4000 Stacking Compatibility
How is the Stack Master Selected? . . . . . . . . 198
Adding a Switch to the Stack
Removing a Switch from the Stack
How is the Firmware Updated on the Stack? . . . 201
What is Stacking Standby?
What is Nonstop Forwarding?
Switch Stack MAC Addressing and Stack
Design Considerations . . . . . . . . . . . . . . . 205
NSF Network Design Considerations
Why is Stacking Needed? . . . . . . . . . . . . . 206
. . . . . . . . . 197
. . . . . . . . . . . . 199
. . . . . . . . . 200
. . . . . . . . . . . . . 201
. . . . . . . . . . . 201
. . . . . . . 205
Default Stacking Values . . . . . . . . . . . . . . . . . 206
Managing and Monitoring the Stack (Web)
Unit Configuration
Stack Summary
. . . . . . . . . . . . . . . . . 207
. . . . . . . . . . . . . . . . . . . 208
. . . . . . 207
Stack Firmware Synchronization. . . . . . . . . . 209
Contents 11
Supported Switches . . . . . . . . . . . . . . . 210
Stack Port Summary
. . . . . . . . . . . . . . . 211
Stack Port Counters. . . . . . . . . . . . . . . . 212
Stack Port Diagnostics
NSF Summary
. . . . . . . . . . . . . . 212
. . . . . . . . . . . . . . . . . . . 213
Checkpoint Statistics . . . . . . . . . . . . . . . 214
Managing the Stack (CLI) . . . . . . . . . . . . . . . 215
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . 215
Viewing and Clearing Stacking and NSF
Information
. . . . . . . . . . . . . . . . . . . . 217
Connecting to the Management Console
from a Stack Member. . . . . . . . . . . . . . . 217
Stacking and NSF Usage Scenarios
Basic Failover
. . . . . . . . . . . . . . . . . . . 218
Preconfiguring a Stack Member
NSF in the Data Center
NSF and VoIP
. . . . . . . . . . . . . . . . . . . 223
NSF and DHCP Snooping
. . . . . . . . . . 218
. . . . . . . . . 220
. . . . . . . . . . . . . . 222
. . . . . . . . . . . . . 224
NSF and the Storage Access Network . . . . . . 225
NSF and Routed Access . . . . . . . . . . . . . 227
10 Authentication, Authorization, and
Accounting . . . . . . . . . . . . . . . . . . . . . . 229
AAA Introduction. . . . . . . . . . . . . . . . . . . . 229
Methods
Method Lists
Access Lines
Access Lines (AAA). . . . . . . . . . . . . . . . 233
Access Lines (Non-AAA)
. . . . . . . . . . . . . . . . . . . . . . 230
. . . . . . . . . . . . . . . . . . . 231
. . . . . . . . . . . . . . . . . . . 232
. . . . . . . . . . . . . 234
12 Contents
Authentication . . . . . . . . . . . . . . . . . . . . . . 235
Authentication Types
Authentication Manager
. . . . . . . . . . . . . . . . 235
. . . . . . . . . . . . . . 236
Using RADIUS . . . . . . . . . . . . . . . . . . . 241
Using TACACS+ Servers to Control
Management Access
. . . . . . . . . . . . . . . . 246
Authentication Examples . . . . . . . . . . . . . . 248
Public Key SSH Authentication Example
Associating a User With an SSH Key
. . . . . . 256
. . . . . . . 263
Authorization
Exec Authorization Capabilities
Authorization Examples
. . . . . . . . . . . . . . . . . . . . . . . 265
. . . . . . . . . . 265
. . . . . . . . . . . . . . . 267
RADIUS Change of Authorization. . . . . . . . . . 269
TACACS Authorization
Accounting
. . . . . . . . . . . . . . . . . . . . . . . . 277
RADIUS Accounting
. . . . . . . . . . . . . . . 273
. . . . . . . . . . . . . . . . 277
IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . . 279
What is IEEE 802.1X?
. . . . . . . . . . . . . . . . 279
What are the 802.1X Port Authentication
Modes? . . . . . . . . . . . . . . . . . . . . . . . 280
What is MAC-Based 802.1X Authentication?
. . . 281
What is the Role of 802.1X in VLAN
Assignment? . . . . . . . . . . . . . . . . . . . . 282
What is Monitor Mode?
. . . . . . . . . . . . . . 285
How Does the Authentication Server Assign
DiffServ Policy? . . . . . . . . . . . . . . . . . . . 286
What is the Internal Authentication Server?
. . . . 287
Default 802.1X Values. . . . . . . . . . . . . . . . 287
Configuring IEEE 802.1X (Web)
. . . . . . . . . . . 288
Captive Portal
Captive Portal Overview
. . . . . . . . . . . . . . . . . . . . . . 313
. . . . . . . . . . . . . . 313
Default Captive Portal Behavior and Settings
. . . 321
Contents 13
Configuring Captive Portal (Web). . . . . . . . . 323
Configuring Captive Portal (CLI)
. . . . . . . . . 341
Captive Portal Configuration Example . . . . . . 347
In Case Of Problems in Captive Portal
Deployment
. . . . . . . . . . . . . . . . . . . . 351
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 353
System Monitoring Overview . . . . . . . . . . . . . 353
What System Information Is Monitored?
Why Is System Information Needed?. . . . . . . 354
Where Are Log Messages Sent?
What Are the Severity Levels?
. . . . . . . . . . 355
What Are the System Startup and Operation
. . . . . . . . . . . . . . . . . . . . . . . 355
Logs?
What Is the Log Message Format? . . . . . . . . 356
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . 357
. . . . . 353
. . . . . . . . . 354
14 Contents
Default Log Settings
. . . . . . . . . . . . . . . . . . 358
Monitoring System Information and Configuring
Logging (Web)
Device Information
System Health
System Resources
Unit Power Usage History
. . . . . . . . . . . . . . . . . . . . . 359
. . . . . . . . . . . . . . . . 359
. . . . . . . . . . . . . . . . . . . 361
. . . . . . . . . . . . . . . . 362
. . . . . . . . . . . . 363
Integrated Cable Test for Copper Cables. . . . . 364
Optical Transceiver Diagnostics
Log Global Settings
. . . . . . . . . . . . . . . . 367
. . . . . . . . . 365
RAM Log . . . . . . . . . . . . . . . . . . . . . 368
Log File
. . . . . . . . . . . . . . . . . . . . . . 369
Syslog Server
Email Alert Global Configuration
. . . . . . . . . . . . . . . . . . . 369
. . . . . . . . . 372
Email Alert Mail Server Configuration . . . . . . . 372
Email Alert Subject Configuration
. . . . . . . . . 374
Email Alert To Address Configuration . . . . . . . 375
Email Alert Statistics
. . . . . . . . . . . . . . . . 376
Monitoring System Information and Configuring
Logging (CLI)
. . . . . . . . . . . . . . . . . . . . . . . 377
Viewing System Information and Enabling
the Locator LED
. . . . . . . . . . . . . . . . . . . 377
Running Cable Diagnostics . . . . . . . . . . . . . 377
Configuring Local Logging
Configuring Remote Logging
Configuring Mail Server Settings
Configuring Email Alerts for Log Messages
. . . . . . . . . . . . . 379
. . . . . . . . . . . . 380
. . . . . . . . . . 381
. . . . 382
Logging Configuration Examples . . . . . . . . . . . . 384
Configuring Local and Remote Logging
. . . . . . 384
Configuring Email Alerting . . . . . . . . . . . . . 386
12 Managing General System Settings . . . 389
System Settings Overview. . . . . . . . . . . . . . . . 389
Why Does System Information Need to Be
Configured?
What Are SDM Templates?
Why is the System Time Needed?
How Does SNTP Work? . . . . . . . . . . . . . . 394
What Configuration Is Required for Plug-In
Modules?
What Are the Key PoE Plus Features for the
Dell Networking N1524P/N1548P, N2024P/
N2048P, and N3024P/N3048P Switches? . . . . . . 396
. . . . . . . . . . . . . . . . . . . . . 391
. . . . . . . . . . . . 391
. . . . . . . . . 394
. . . . . . . . . . . . . . . . . . . . . . 395
Default General System Information
Power Management in Guard Band
. . . . . . . . . . 397
. . . . . . . . 397
Contents 15
Dynamic/Static Power Management Mode . . . 398
Class-Based Power Management Mode
. . . . . 398
Configuring General System Settings (Web) . . . 398
System Information
CLI Banner
SDM Template Preference
. . . . . . . . . . . . . . . . . . . . . . . 404
Clock
. . . . . . . . . . . . . . . . 398
. . . . . . . . . . . . . . . . . . . . 402
. . . . . . . . . . . . 403
SNTP Global Settings . . . . . . . . . . . . . . . 405
SNTP Authentication
SNTP Server
Summer Time Configuration
Time Zone Configuration
Card Configuration
Slot Summary
. . . . . . . . . . . . . . . 406
. . . . . . . . . . . . . . . . . . . 408
. . . . . . . . . . . 411
. . . . . . . . . . . . . 412
. . . . . . . . . . . . . . . . 413
. . . . . . . . . . . . . . . . . . . 414
Supported Cards . . . . . . . . . . . . . . . . . 415
Power Over Ethernet Global Configuration
(Dell Networking N1524P/N1548P, N2024P/
N2048P, and N3024P/N3048P Only)
. . . . . . . . 416
Power Over Ethernet Interface Configuration
(Dell Networking N1524P/N1548P, N2024P/
N2048P, and N3024P/N3048P Only)
. . . . . . . . 417
16 Contents
Configuring System Settings (CLI)
Configuring System Information
Configuring the Banner
Managing the SDM Template
. . . . . . . . . . . 419
. . . . . . . . . 419
. . . . . . . . . . . . . . 420
. . . . . . . . . . 421
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . 421
Setting the System Time and Date Manually
Configuring the Expansion Slots (Dell
Networking N3000 Series Only)
. . . . . . . . . . 424
Viewing Slot Information (Dell Networking
N4000 Series Only) . . . . . . . . . . . . . . . . 425
Configuring PoE Settings (Dell Networking
N1524P/N1548P, N2024P/N2048P, and N3024P/
N3048P Only) . . . . . . . . . . . . . . . . . . . 425
. . . 423
General System Settings Configuration
Examples. . . . . . . . . . . . . . . . . . . . . . . . . 427
Configuring System and Banner Information
. . . 427
Configuring SNTP. . . . . . . . . . . . . . . . . . 430
Configuring the Time Manually. . . . . . . . . . . 432
13 SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . 433
SNMP Overview . . . . . . . . . . . . . . . . . . . . . 433
What Is SNMP?
What Are SNMP Traps?
Why Is SNMP Needed? . . . . . . . . . . . . . . 435
Default SNMP Values . . . . . . . . . . . . . . . . . . 435
. . . . . . . . . . . . . . . . . . . 433
. . . . . . . . . . . . . . 434
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings
Access Control Group
SNMPv3 User Security Model (USM)
. . . . . . . . . . . . . . . . 437
. . . . . . . . . . . . . 437
. . . . . . . . . . . . . . . . 438
. . . . . . . . . . . . . . . 440
. . . . . . . 442
Communities . . . . . . . . . . . . . . . . . . . . 445
Notification Filter
Notification Recipients
Trap Flags
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . . . 447
. . . . . . . . . . . . . . . 448
. . . . . . . . . . . . . . . . . . . . . . 450
. . . . . . . . . . . . . . . . . 451
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . . 452
Trap Log
Configuring SNMP (CLI)
Configuring the SNMPv3 Engine ID
. . . . . . . . . . . . . . . . . . . . . . . 453
. . . . . . . . . . . . . . . . . 455
. . . . . . . . 455
Configuring SNMP Views, Groups, and Users
Configuring Communities
. . . . . . . . . . . . . . 459
Configuring SNMP Notifications (Traps
and Informs) . . . . . . . . . . . . . . . . . . . . 461
Contents 17
. . . 456
SNMP Configuration Examples . . . . . . . . . . . . 464
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . 465
. . . . . . . . 464
14 Images and File Management . . . . . . . . 469
Image and File Management Overview . . . . . . . . 469
What Files Can Be Managed?
Why Is File Management Needed?
What Methods Are Supported for File
Management?. . . . . . . . . . . . . . . . . . . 474
What Factors Should Be Considered When
Managing Files?. . . . . . . . . . . . . . . . . . 474
How Is the Running Configuration Saved?
. . . . . . . . . . 469
. . . . . . . . 471
. . . . 477
18 Contents
N3000 Dual Images
Access Router/Switch Role
Aggregation Router Role
Managing Images and Files (Web)
File System
Active Images
USB Flash Drive
. . . . . . . . . . . . . . . . . . . 477
. . . . . . . . . . . . 477
. . . . . . . . . . . . . 478
. . . . . . . . . . 479
. . . . . . . . . . . . . . . . . . . . 479
. . . . . . . . . . . . . . . . . . . 480
. . . . . . . . . . . . . . . . . . 481
File Download. . . . . . . . . . . . . . . . . . . 482
File Upload
Copy Files
. . . . . . . . . . . . . . . . . . . . 484
. . . . . . . . . . . . . . . . . . . . . 486
Managing Images and Files (CLI) . . . . . . . . . . . 487
Downloading and Activating a New Image
. . . . . . . . . . . . . . . . . . . . . . . 487
(TFTP)
Managing Files in Internal Flash
Managing Files on a USB Flash Device
. . . . . . . . . 489
. . . . . 490
Uploading a Configuration File (SCP) . . . . . . . 490
Managing Configuration Scripts (SFTP) . . . . . 491
File and Image Management Configuration
Examples. . . . . . . . . . . . . . . . . . . . . . . . . 492
Upgrading the Firmware
. . . . . . . . . . . . . . 492
Managing Configuration Scripts . . . . . . . . . . 495
Managing Files by Using the USB Flash Drive
. . . 497
15 DHCP and USB Auto-Configuration. . . . 499
Auto Configuration Overview . . . . . . . . . . . . . . 499
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
Use?
. . . . . . . . . . . . . . . . . . . . . . . . . 500
How Does USB Auto Configuration Use the
Files on the USB Device? . . . . . . . . . . . . . . 501
What Is the Setup File Format?
What Is the DHCP Auto Configuration
Process? . . . . . . . . . . . . . . . . . . . . . . 503
Monitoring and Completing the DHCP
Auto Configuration Process . . . . . . . . . . . . 509
What Are the Dependencies for DHCP
Auto Configuration?
. . . . . . . . . . . . . . . . 510
. . . . . . . . . 500
. . . . . . . . . . . 503
Default Auto Configuration Values
Managing Auto Configuration (Web)
Auto-Install Configuration
. . . . . . . . . . . 511
. . . . . . . . . . 512
. . . . . . . . . . . . . 512
Managing Auto Configuration (CLI) . . . . . . . . . . . 513
Managing Auto Configuration
Auto Configuration Example
. . . . . . . . . . . 513
. . . . . . . . . . . . . . . 514
Enabling USB Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . . 514
Enabling DHCP Auto Configuration and Auto
Image Download . . . . . . . . . . . . . . . . . . 515
Easy Firmware Upgrade via USB
. . . . . . . . . . 517
Contents 19
16 Monitoring Switch Traffic . . . . . . . . . . . 519
Traffic Monitoring Overview. . . . . . . . . . . . . . 519
What is sFlow Technology?
What is RMON?
. . . . . . . . . . . . . . . . . . 522
What is Port Mirroring?
Port Mirroring Behaviors . . . . . . . . . . . . . 524
Remote Capture
. . . . . . . . . . . . . . . . . . 526
Why is Traffic Monitoring Needed?
. . . . . . . . . . . . 519
. . . . . . . . . . . . . . 523
. . . . . . . 526
Default Traffic Monitoring Values
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration
sFlow Sampler Configuration
. . . . . . . . . . . 526
. . . . . . . . . . . 527
. . . . . . . . . . . . . . 527
. . . . . . . . . . 528
. . . . . . . . . . . 529
sFlow Poll Configuration . . . . . . . . . . . . . 530
Interface Statistics
Etherlike Statistics
. . . . . . . . . . . . . . . . 531
. . . . . . . . . . . . . . . . 532
GVRP Statistics . . . . . . . . . . . . . . . . . . 533
EAP Statistics
Utilization Summary
. . . . . . . . . . . . . . . . . . . 534
. . . . . . . . . . . . . . . . 535
Counter Summary. . . . . . . . . . . . . . . . . 536
Switchport Statistics
RMON Statistics
. . . . . . . . . . . . . . . 537
. . . . . . . . . . . . . . . . . 538
RMON History Control Statistics . . . . . . . . . 539
RMON History Table . . . . . . . . . . . . . . . 541
RMON Event Control . . . . . . . . . . . . . . . 542
RMON Event Log
RMON Alarms
. . . . . . . . . . . . . . . . . 544
. . . . . . . . . . . . . . . . . . . 545
Port Statistics . . . . . . . . . . . . . . . . . . . 547
LAG Statistics
Port Mirroring
. . . . . . . . . . . . . . . . . . . 548
. . . . . . . . . . . . . . . . . . . 549
20 Contents
Monitoring Switch Traffic (CLI) . . . . . . . . . . . . 551
Configuring sFlow
. . . . . . . . . . . . . . . . . 551
Configuring RMON . . . . . . . . . . . . . . . . . 553
Viewing Statistics
. . . . . . . . . . . . . . . . . . 555
Configuring Port Mirroring . . . . . . . . . . . . . 556
Configuring RSPAN
. . . . . . . . . . . . . . . . . 557
Traffic Monitoring Examples
Showing Interface Traffic
Configuring sFlow
Configuring RMON
Configuring Remote Capture
Configuring RSPAN
. . . . . . . . . . . . . . 560
. . . . . . . . . . . . . 560
. . . . . . . . . . . . . . . . . . 561
. . . . . . . . . . . . . . . . . 563
. . . . . . . . . . . . 564
. . . . . . . . . . . . . . . . . 569
17 iSCSI Optimization . . . . . . . . . . . . . . . . . 573
iSCSI Optimization Overview . . . . . . . . . . . . . . 573
What Does iSCSI Optimization Do?
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . . 574
How Does the Switch Detect iSCSI Traffic
Flows?. . . . . . . . . . . . . . . . . . . . . . . . 574
How Is Quality of Service Applied to iSCSI
Traffic Flows?. . . . . . . . . . . . . . . . . . . . 575
How Does iSCSI Optimization Use ACLs?
What Information Does the Switch Track in
iSCSI Traffic Flows? . . . . . . . . . . . . . . . . 576
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 577
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . . 577
How Does iSCSI Optimization Interact with
DCBx? . . . . . . . . . . . . . . . . . . . . . . . . 578
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions . . . . . . . . 579
. . . . . . . . . 574
. . . . . 576
Default iSCSI Optimization Values . . . . . . . . . . . 580
Contents 21
Configuring iSCSI Optimization (Web). . . . . . . . . 581
iSCSI Global Configuration
iSCSI Targets Table
iSCSI Sessions Table
iSCSI Sessions Detailed
. . . . . . . . . . . . 581
. . . . . . . . . . . . . . . . 582
. . . . . . . . . . . . . . . 583
. . . . . . . . . . . . . 584
Configuring iSCSI Optimization (CLI) . . . . . . . . . 585
iSCSI Optimization Configuration Examples
. . . . . 587
Configuring iSCSI Optimization Between
Servers and a Disk Array
. . . . . . . . . . . . . 587
18 Port Characteristics . . . . . . . . . . . . . . . 591
Port Overview . . . . . . . . . . . . . . . . . . . . . 591
What Physical Port Characteristics Can
Be Configured?
Auto-Negotiation . . . . . . . . . . . . . . . . . 593
Maximum Transmission Unit . . . . . . . . . . . 593
What is Link Dependency? . . . . . . . . . . . . 594
What Interface Types are Supported?
What is Interface Configuration Mode?
What Are the Green Ethernet Features?
Switchport Modes
Default Port Values
Configuring Port Characteristics (Web)
Port Configuration
Link Dependency Configuration
Link Dependency Summary
Port Green Ethernet Configuration . . . . . . . . 607
Port Green Ethernet Statistics
Port Green Ethernet LPI History
. . . . . . . . . . . . . . . . . . 591
. . . . . . 596
. . . . . 596
. . . . . 598
. . . . . . . . . . . . . . . . 599
. . . . . . . . . . . . . . . . . . 600
. . . . . . . . 601
. . . . . . . . . . . . . . . . . 601
. . . . . . . . . 604
. . . . . . . . . . . . 606
. . . . . . . . . . 608
. . . . . . . . . 610
22 Contents
Configuring Port Characteristics (CLI) . . . . . . . . . 611
Configuring Port Settings
Configuring Link Dependencies
Configuring Green Features
. . . . . . . . . . . . . . 611
. . . . . . . . . . 613
. . . . . . . . . . . . 614
Port Configuration Examples
Configuring Port Settings
Configuring a Link Dependency Groups
Configuring a Port in Access Mode
Configuring a Port in Trunk Mode
Configuring a Port in General Mode
. . . . . . . . . . . . . . 615
. . . . . . . . . . . . . . 615
. . . . . . 616
. . . . . . . . 616
. . . . . . . . . 617
. . . . . . . . 620
19 Port and System Security . . . . . . . . . . . 623
Port-based Security—Port MAC Locking . . . . . . . . 623
Denial of Service
. . . . . . . . . . . . . . . . . . . . 628
20 Access Control Lists . . . . . . . . . . . . . . . 629
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 629
ACL Counters
What Are MAC ACLs? . . . . . . . . . . . . . . . 631
What Are IP ACLs?
ACL Actions
What Is the ACL Redirect Function? . . . . . . . . 633
What Is the ACL Mirror Function?
What Is ACL Logging
What Are Time-Based ACLs? . . . . . . . . . . . 634
ACL Limitations
. . . . . . . . . . . . . . . . . . . . 631
. . . . . . . . . . . . . . . . . 632
. . . . . . . . . . . . . . . . . . . . . 632
. . . . . . . . . 634
. . . . . . . . . . . . . . . . 634
. . . . . . . . . . . . . . . . . . . 635
ACL Configuration Details
How Are ACLs Configured?
Editing Access Lists
. . . . . . . . . . . . . . . . 639
. . . . . . . . . . . . . 639
. . . . . . . . . . . . . . . . 639
Contents 23
Preventing False ACL Matches . . . . . . . . . . 640
Using IP and MAC Address Masks
. . . . . . . . 641
Policy-Based Routing
Packet Classification
Route-Map Processing
. . . . . . . . . . . . . . . . . 643
. . . . . . . . . . . . . . . 643
. . . . . . . . . . . . . . 644
Route-Map Actions . . . . . . . . . . . . . . . . 645
Interface ACLs and PBR Interaction
PBR and Implicit Deny-all
. . . . . . . . . . . . . 648
. . . . . . . 647
Limitations. . . . . . . . . . . . . . . . . . . . . 648
Configuring ACLs (Web) . . . . . . . . . . . . . . . . 651
IP ACL Configuration
. . . . . . . . . . . . . . . 651
IP ACL Rule Configuration . . . . . . . . . . . . 653
MAC ACL Configuration. . . . . . . . . . . . . . 655
MAC ACL Rule Configuration . . . . . . . . . . . 657
IPv6 ACL Configuration . . . . . . . . . . . . . . 658
IPv6 ACL Rule Configuration
ACL Binding Configuration
Time Range Entry Configuration
Configuring ACLs (CLI)
. . . . . . . . . . . . . . . . . 664
Configuring an IPv4 ACL
Configuring a MAC ACL
Configuring an IPv6 ACL
. . . . . . . . . . . 659
. . . . . . . . . . . . 661
. . . . . . . . . 662
. . . . . . . . . . . . . 664
. . . . . . . . . . . . . . 670
. . . . . . . . . . . . . 674
Configuring a Time Range . . . . . . . . . . . . 677
24 Contents
ACL Configuration Examples
Basic Rules
. . . . . . . . . . . . . . . . . . . . 679
Internal System ACLs
. . . . . . . . . . . . . . 679
. . . . . . . . . . . . . . . 680
Complete ACL Example . . . . . . . . . . . . . . 681
Advanced Examples . . . . . . . . . . . . . . . 685
Policy-Based Routing Examples
. . . . . . . . . 697
21 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 701
VLAN Overview . . . . . . . . . . . . . . . . . . . . . 701
VLAN Tagging
GVRP
. . . . . . . . . . . . . . . . . . . . . . . . 705
Double-VLAN Tagging
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 707
Private VLANs
Additional VLAN Features
. . . . . . . . . . . . . . . . . . . 704
. . . . . . . . . . . . . . . 705
. . . . . . . . . . . . . . . . . . . 709
. . . . . . . . . . . . . 715
Default VLAN Behavior
Configuring VLANs (Web)
VLAN Membership
VLAN Port Settings
VLAN LAG Settings
Bind MAC to VLAN
Bind IP Subnet to VLAN
GVRP Parameters
Protocol Group
Adding a Protocol Group
Double VLAN Global Configuration
Double VLAN Interface Configuration
Voice VLAN
. . . . . . . . . . . . . . . . . 716
. . . . . . . . . . . . . . . . 718
. . . . . . . . . . . . . . . . . 718
. . . . . . . . . . . . . . . . . 723
. . . . . . . . . . . . . . . . . 724
. . . . . . . . . . . . . . . . . 726
. . . . . . . . . . . . . . 727
. . . . . . . . . . . . . . . . . . 728
. . . . . . . . . . . . . . . . . . . 730
. . . . . . . . . . . . . . 731
. . . . . . . . . 733
. . . . . . . 734
. . . . . . . . . . . . . . . . . . . . . 736
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . . 737
Creating a VLAN
. . . . . . . . . . . . . . . . . . 737
Configuring VLAN Settings for a LAG . . . . . . . 738
Configuring Double VLAN Tagging . . . . . . . . . 739
Configuring MAC-Based VLANs
Configuring IP-Based VLANs
Configuring a Protocol-Based VLAN
Configuring GVRP
. . . . . . . . . . . . . . . . . . 749
. . . . . . . . . . 742
. . . . . . . . . . . . 744
. . . . . . . . 746
Configuring Voice VLANs. . . . . . . . . . . . . . 751
Configuring a Voice VLAN (Extended
Example)
. . . . . . . . . . . . . . . . . . . . . . 753
Contents 25
Enterprise Voice VLAN Configuration
With QoS . . . . . . . . . . . . . . . . . . . . . 754
MLAG with RPVST and Voice VLAN . . . . . . . 756
Assigning an 802.1p Priority to VLAN Traffic
Configuring a Private VLAN
. . . . . . . . . . . . 763
. . . 763
VLAN Configuration Examples
. . . . . . . . . . . . . 766
Configuring VLANs Using The Dell
OpenManage Administrator
. . . . . . . . . . . 766
Configuring VLANs Using the CLI. . . . . . . . . 774
22 Spanning Tree Protocol . . . . . . . . . . . . . 779
STP Overview . . . . . . . . . . . . . . . . . . . . . 779
What Are Classic STP, Multiple STP, and
Rapid STP?
How Does STP Work?
How Does MSTP Operate in the Network?
MSTP with Multiple Forwarding Paths
MSTP and VLAN IDs
What are the Optional STP Features? . . . . . . 786
RSTP-PV
DirectLink Rapid Convergence
IndirectLink Rapid Convergence Feature
Interoperability Between STP-PV and
RSTP-PV Modes
Interoperability With IEEE Spanning Tree
Protocols . . . . . . . . . . . . . . . . . . . . . 793
Configuration Examples
. . . . . . . . . . . . . . . . . . . . 779
. . . . . . . . . . . . . . 780
. . . . 781
. . . . . . 785
. . . . . . . . . . . . . . . 786
. . . . . . . . . . . . . . . . . . . . . . . . 788
. . . . . . . . . . 789
. . . . . 791
. . . . . . . . . . . . . . . . . 793
. . . . . . . . . . . . . . 798
26 Contents
Default STP Values
. . . . . . . . . . . . . . . . . . . 799
Configuring Spanning Tree (Web)
STP Global Settings
STP Port Settings
. . . . . . . . . . . . . . . . 800
. . . . . . . . . . . . . . . . . 802
. . . . . . . . . . . 800
STP LAG Settings . . . . . . . . . . . . . . . . . . 804
Rapid Spanning Tree
MSTP Settings
MSTP Interface Settings
. . . . . . . . . . . . . . . . 805
. . . . . . . . . . . . . . . . . . . 807
. . . . . . . . . . . . . . 809
Configuring Spanning Tree (CLI) . . . . . . . . . . . . 810
Configuring Global STP Bridge Settings
. . . . . . 810
Configuring Optional STP Features. . . . . . . . . 811
Configuring STP Interface Settings
Configuring MSTP Switch Settings
Configuring MSTP Interface Settings
. . . . . . . . 812
. . . . . . . . . 813
. . . . . . . 814
STP Configuration Examples
STP Configuration Example
MSTP Configuration Example
. . . . . . . . . . . . . . 815
. . . . . . . . . . . . . 815
. . . . . . . . . . . 817
RSTP-PV Access Switch Configuration
Example . . . . . . . . . . . . . . . . . . . . . . . 820
23 Discovering Network Devices. . . . . . . . 825
Device Discovery Overview . . . . . . . . . . . . . . . 825
What Is ISDP?
What is LLDP? . . . . . . . . . . . . . . . . . . . 825
What is LLDP-MED?
Why are Device Discovery Protocols
Needed? . . . . . . . . . . . . . . . . . . . . . . 826
Default IDSP and LLDP Values . . . . . . . . . . . . . 827
Configuring ISDP and LLDP (Web)
ISDP Global Configuration
ISDP Cache Table
ISDP Interface Configuration. . . . . . . . . . . . 831
ISDP Statistics . . . . . . . . . . . . . . . . . . . 832
LLDP Configuration
. . . . . . . . . . . . . . . . . . . 825
. . . . . . . . . . . . . . . . 826
. . . . . . . . . . . 829
. . . . . . . . . . . . . 829
. . . . . . . . . . . . . . . . . 830
. . . . . . . . . . . . . . . . . 833
Contents 27
LLDP Statistics . . . . . . . . . . . . . . . . . . 835
LLDP Connections
. . . . . . . . . . . . . . . . . 836
LLDP-MED Global Configuration . . . . . . . . . 838
LLDP-MED Interface Configuration
LLDP-MED Local Device Information
. . . . . . . . 839
. . . . . . . 840
LLDP-MED Remote Device Information . . . . . 840
Configuring ISDP and LLDP (CLI)
Configuring Global ISDP Settings
Enabling ISDP on a Port
Viewing and Clearing ISDP Information
Configuring Global LLDP Settings
Configuring Port-based LLDP Settings
Viewing and Clearing LLDP Information
. . . . . . . . . . . 841
. . . . . . . . . 841
. . . . . . . . . . . . . 842
. . . . . 842
. . . . . . . . . 843
. . . . . . 843
. . . . . 844
Configuring LLDP-MED Settings . . . . . . . . . 845
Viewing LLDP-MED Information . . . . . . . . . 846
Device Discovery Configuration Examples
Configuring ISDP
Configuring LLDP
. . . . . . . . . . . . . . . . . 846
. . . . . . . . . . . . . . . . . 847
. . . . . . 846
24 Port-Based Traffic Control . . . . . . . . . . 849
Port-Based Traffic Control Overview . . . . . . . . . 849
What is Flow Control?
What is Storm Control?
What are Protected Ports? . . . . . . . . . . . . 851
What is Error Recovery?
What is Link Local Protocol Filtering?
What is Loop Protection? . . . . . . . . . . . . . 853
. . . . . . . . . . . . . . . 850
. . . . . . . . . . . . . . 850
. . . . . . . . . . . . . 851
. . . . . . 851
28 Contents
Default Port-Based Traffic Control Values . . . . . . 854
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
. . . . 855
. . . . . . 855
Storm Control . . . . . . . . . . . . . . . . . . . . 856
Protected Port Configuration
. . . . . . . . . . . . 858
LLPF Configuration . . . . . . . . . . . . . . . . . 860
Configuring Port-Based Traffic Control (CLI)
Configuring Flow Control and Storm Control
Configuring Protected Ports
. . . . . . . . . . . . 863
. . . . . . 862
. . . . 862
Configuring LLPF . . . . . . . . . . . . . . . . . . 864
Port-Based Traffic Control Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . . 865
25 Layer-2 Multicast Features . . . . . . . . . . 867
L2 Multicast Overview. . . . . . . . . . . . . . . . . . 867
Multicast Flooding and Forwarding
What Are the Multicast Bridging Features? . . . . 868
What Is L2 Multicast Traffic?
What Is IGMP Snooping?
What Is MLD Snooping?
. . . . . . . . . . . . . . 869
. . . . . . . . . . . . . . 871
What Is Multicast VLAN Registration?
When Are Layer-3 Multicast Features
Required? . . . . . . . . . . . . . . . . . . . . . . 874
What Are GARP and GMRP?
Snooping Switch Restrictions
. . . . . . . . . . . . . . 876
MAC Address-Based Multicast Group
Topologies Where the Multicast Source
Is Not Directly Connected to the Querier. . . . . . 876
Using Static Multicast MAC Configuration
IGMP Snooping and GMRP
. . . . . . . . 867
. . . . . . . . . . . . 869
. . . . . . . 873
. . . . . . . . . . . . 874
. . . . . . . 876
. . . . . 876
. . . . . . . . . . . . . 876
Default L2 Multicast Values
. . . . . . . . . . . . . . . 877
Configuring L2 Multicast Features (Web)
Multicast Global Parameters
. . . . . . . . . . . . 879
. . . . . . . . 879
Contents 29
Bridge Multicast Group . . . . . . . . . . . . . . 880
MRouter Status
. . . . . . . . . . . . . . . . . . 883
General IGMP Snooping . . . . . . . . . . . . . 884
Global Querier Configuration
VLAN Querier
. . . . . . . . . . . . . . . . . . . 888
. . . . . . . . . . . 887
VLAN Querier Status . . . . . . . . . . . . . . . 890
MFDB IGMP Snooping Table
MLD Snooping General
. . . . . . . . . . . 891
. . . . . . . . . . . . . . 892
MLD Snooping Global Querier Configuration. . . 894
MLD Snooping VLAN Querier. . . . . . . . . . . 895
MLD Snooping VLAN Querier Status . . . . . . . 897
MFDB MLD Snooping Table
MVR Global Configuration
. . . . . . . . . . . 898
. . . . . . . . . . . . 899
MVR Members . . . . . . . . . . . . . . . . . . 900
MVR Interface Configuration
MVR Statistics
GARP Timers
GMRP Parameters
MFDB GMRP Table
. . . . . . . . . . . . . . . . . . 903
. . . . . . . . . . . . . . . . . . . 904
. . . . . . . . . . . . . . . . 906
. . . . . . . . . . . . . . . . 908
. . . . . . . . . . . 901
30 Contents
Configuring L2 Multicast Features (CLI)
Configuring Layer-2 Multicasting
Configuring IGMP Snooping on VLANs
Configuring IGMP Snooping Querier
. . . . . . . . 909
. . . . . . . . . 909
. . . . . . 910
. . . . . . . 911
Configuring MLD Snooping on VLANs . . . . . . 912
Configuring MLD Snooping Querier
Configuring MVR
. . . . . . . . . . . . . . . . . 914
. . . . . . . 913
Configuring GARP Timers and GMRP. . . . . . . 916
Case Study on a Real-World Network Topology . . . 917
Multicast Snooping Case Study
. . . . . . . . . 917