Dell 210-AEIR, 210-AEVX, 210-ABOH, 210-ABNV User Guide

0 (0)
Dell 210-AEIR, 210-AEVX, 210-ABOH, 210-ABNV User Guide

Dell Networking N-Series

N1500, N2000, N3000, and

N4000 Switches

User’s Configuration

Guide

Version 6.3.0.0 and Later

Regulatory Models: N1524, N1524P, N1548, N1548P, N2024, N2024P, N2038, N2048P, N3024, N3024F, N3024P, N3048, N3048P, N4032, N4032F, N4064, N4064F

Notes and Cautions

NOTE: A NOTE indicates important information that helps you make better use of your computer.

CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed.

____________

Information in this publication is subject to change without notice.

Copyright © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

Regulatory Models: N1524, N1524P, N1548, N1548P, N2024, N2024P, N2038, N2048P, N3024, N3024F, N3024P, N3048, N3048P, N4032, N4032F, N4064, N4064F

January 2016

Rev. A02

Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . .

55

About This Document . . . . . . . . . . . . . . . . . .

55

Audience . . . . . . . . . . . . . . . . . . . . . . . . .

55

Document Conventions . . . . . . . . . . . . . . . . .

56

Additional Documentation. . . . . . . . . . . . . . . .

56

2 Switch Feature Overview . . . . . . . . . . . .

57

System Management Features . . . . . . . . . . . . .

58

Multiple Management Options . . . . . . . . . . .

58

System Time Management . . . . . . . . . . . . .

58

Log Messages . . . . . . . . . . . . . . . . . . .

59

Integrated DHCP Server . . . . . . . . . . . . . .

59

Management of Basic Network Information . . . .

59

IPv6 Management Features . . . . . . . . . . . .

60

Dual Software Images . . . . . . . . . . . . . . .

60

File Management . . . . . . . . . . . . . . . . . .

60

Switch Database Management Templates . . . .

61

Automatic Installation of Firmware and

 

Configuration . . . . . . . . . . . . . . . . . . . .

61

sFlow . . . . . . . . . . . . . . . . . . . . . . . .

62

SNMP Alarms and Trap Logs. . . . . . . . . . . .

62

CDP Interoperability Through ISDP . . . . . . . .

63

Remote Monitoring (RMON) . . . . . . . . . . . .

63

N3000 Series Access and Aggregation

 

Firmware Images . . . . . . . . . . . . . . . . . .

63

Contents 3

Stacking Features . . . . . . . . . . . . . . . . . . . .

65

High Stack Count . . . . . . . . . . . . . . . . . .

65

Single IP Management . . . . . . . . . . . . . . .

65

Master Failover with Transparent Transition. . . .

65

Nonstop Forwarding on the Stack . . . . . . . . .

66

Hot Add/Delete and Firmware

 

Synchronization . . . . . . . . . . . . . . . . . . .

66

Security Features . . . . . . . . . . . . . . . . . . . .

67

Configurable Access and Authentication

67

Profiles . . . . . . . . . . . . . . . . . . . . . . .

Password-Protected Management Access . . . .

67

Strong Password Enforcement . . . . . . . . . . .

67

TACACS+ Client . . . . . . . . . . . . . . . . . . .

67

RADIUS Support . . . . . . . . . . . . . . . . . .

68

SSH/SSL. . . . . . . . . . . . . . . . . . . . . . .

68

Inbound Telnet Control . . . . . . . . . . . . . . .

68

Denial of Service . . . . . . . . . . . . . . . . . .

68

Port Protection . . . . . . . . . . . . . . . . . . .

69

Captive Portal . . . . . . . . . . . . . . . . . . . .

70

802.1X Authentication (IEEE 802.1X) . . . . . . . .

70

MAC-Based 802.1X Authentication . . . . . . . . .

71

802.1X Monitor Mode . . . . . . . . . . . . . . . .

71

MAC-Based Port Security . . . . . . . . . . . . .

71

Access Control Lists (ACLs) . . . . . . . . . . . .

72

Time-Based ACLs . . . . . . . . . . . . . . . . . .

72

IP Source Guard (IPSG) . . . . . . . . . . . . . . .

72

DHCP Snooping . . . . . . . . . . . . . . . . . . .

73

Dynamic ARP Inspection . . . . . . . . . . . . . .

73

Protected Ports (Private VLAN Edge). . . . . . . .

73

Green Technology Features . . . . . . . . . . . . . . .

74

Energy Detect Mode . . . . . . . . . . . . . . . .

74

Energy Efficient Ethernet . . . . . . . . . . . . . .

74

4 Contents

Power Utilization Reporting . . . . . . . . . . . .

74

Power over Ethernet (PoE) Plus Features . . . . . . . .

75

Power Over Ethernet (PoE) Plus

75

Configuration . . . . . . . . . . . . . . . . . . . .

PoE Plus Support . . . . . . . . . . . . . . . . . .

75

UPOE Support. . . . . . . . . . . . . . . . . . . .

75

Switching Features . . . . . . . . . . . . . . . . . . .

76

Flow Control Support (IEEE 802.3x) . . . . . . . . .

76

Head of Line Blocking Prevention . . . . . . . . .

76

Alternate Store and Forward (ASF). . . . . . . . .

76

Jumbo Frames Support . . . . . . . . . . . . . . .

76

Auto-MDI/MDIX Support . . . . . . . . . . . . . .

77

VLAN-Aware MAC-based Switching. . . . . . . .

77

Back Pressure Support . . . . . . . . . . . . . . .

77

Auto-negotiation . . . . . . . . . . . . . . . . . .

77

Storm Control . . . . . . . . . . . . . . . . . . . .

78

Port Mirroring. . . . . . . . . . . . . . . . . . . .

78

Static and Dynamic MAC Address Tables . . . . .

78

Link Layer Discovery Protocol (LLDP) . . . . . . .

79

Link Layer Discovery Protocol (LLDP) for

 

Media Endpoint Devices . . . . . . . . . . . . . .

79

Connectivity Fault Management

 

(IEEE 802.1ag) . . . . . . . . . . . . . . . . . . . .

79

Priority-based Flow Control (PFC) . . . . . . . . .

79

Data Center Bridging Exchange (DBCx)

 

Protocol . . . . . . . . . . . . . . . . . . . . . . .

80

Enhanced Transmission Selection . . . . . . . . .

80

Cisco Protocol Filtering . . . . . . . . . . . . . . .

81

DHCP Layer-2 Relay . . . . . . . . . . . . . . . .

81

Virtual Local Area Network Supported Features . . . .

82

VLAN Support. . . . . . . . . . . . . . . . . . . .

82

Port-Based VLANs . . . . . . . . . . . . . . . . .

82

Contents 5

IP Subnet-based VLAN . . . . . . . . . . . . . . .

82

MAC-based VLAN. . . . . . . . . . . . . . . . . .

82

IEEE 802.1v Protocol-Based VLANs. . . . . . . . .

82

GARP and GVRP Support . . . . . . . . . . . . . .

82

Voice VLAN . . . . . . . . . . . . . . . . . . . . .

83

Guest VLAN . . . . . . . . . . . . . . . . . . . . .

83

Unauthorized VLAN . . . . . . . . . . . . . . . . .

83

Double VLANs. . . . . . . . . . . . . . . . . . . .

83

Spanning Tree Protocol Features . . . . . . . . . . . .

84

Spanning Tree Protocol (STP) . . . . . . . . . . .

84

Spanning Tree Port Settings . . . . . . . . . . . .

84

Rapid Spanning Tree . . . . . . . . . . . . . . . .

84

Multiple Spanning Tree . . . . . . . . . . . . . . .

84

Bridge Protocol Data Unit (BPDU) Guard. . . . . .

85

BPDU Filtering . . . . . . . . . . . . . . . . . . .

85

RSTP-PV and STP-PV . . . . . . . . . . . . . . . .

85

Link Aggregation Features. . . . . . . . . . . . . . . .

86

Link Aggregation . . . . . . . . . . . . . . . . . .

86

Link Aggregate Control Protocol (LACP) . . . . . .

87

Multi-Switch LAG (MLAG) . . . . . . . . . . . . .

87

Routing Features . . . . . . . . . . . . . . . . . . . . .

88

Address Resolution Protocol (ARP) Table

88

Management . . . . . . . . . . . . . . . . . . . .

VLAN Routing . . . . . . . . . . . . . . . . . . . .

88

IP Configuration . . . . . . . . . . . . . . . . . . .

88

Open Shortest Path First (OSPF) . . . . . . . . . .

88

Border Gateway Protocol (BGP) . . . . . . . . . .

89

Virtual Routing and Forwarding (VRF) . . . . . . .

89

BOOTP/DHCP Relay Agent . . . . . . . . . . . . .

90

IP Helper and UDP Relay . . . . . . . . . . . . . .

90

Routing Information Protocol . . . . . . . . . . . .

90

Router Discovery . . . . . . . . . . . . . . . . . .

90

6 Contents

Routing Table . . . . . . . . . . . . . . . . . . . .

90

 

 

Virtual Router Redundancy Protocol (VRRP) . . . .

91

 

 

Tunnel and Loopback Interfaces . . . . . . . . . .

91

 

 

IPv6 Routing Features . . . . . . . . . . . . . . . . . .

92

 

 

IPv6 Configuration . . . . . . . . . . . . . . . . .

92

 

 

IPv6 Routes . . . . . . . . . . . . . . . . . . . . .

92

 

 

OSPFv3 . . . . . . . . . . . . . . . . . . . . . . .

92

 

 

DHCPv6 . . . . . . . . . . . . . . . . . . . . . . .

92

 

 

Quality of Service (QoS) Features . . . . . . . . . . . .

93

 

 

Differentiated Services (DiffServ) . . . . . . . . .

93

 

 

Class Of Service (CoS) . . . . . . . . . . . . . . .

93

 

 

Auto Voice over IP (VoIP). . . . . . . . . . . . . .

93

 

 

Internet Small Computer System Interface

 

 

 

(iSCSI) Optimization. . . . . . . . . . . . . . . . .

94

 

 

Layer-2 Multicast Features . . . . . . . . . . . . . . .

94

 

 

MAC Multicast Support. . . . . . . . . . . . . . .

94

 

 

IGMP Snooping . . . . . . . . . . . . . . . . . . .

94

 

 

IGMP Snooping Querier . . . . . . . . . . . . . .

95

 

 

MLD Snooping . . . . . . . . . . . . . . . . . . .

95

 

 

Multicast VLAN Registration . . . . . . . . . . . .

95

 

 

Layer-3 Multicast Features . . . . . . . . . . . . . . .

96

 

 

Distance Vector Multicast Routing Protocol . . . .

96

 

 

Internet Group Management Protocol . . . . . . .

96

 

 

IGMP Proxy . . . . . . . . . . . . . . . . . . . . .

96

 

 

Protocol Independent Multicast—Dense

 

 

 

Mode . . . . . . . . . . . . . . . . . . . . . . . .

96

 

 

Protocol Independent Multicast—Sparse

 

 

 

Mode . . . . . . . . . . . . . . . . . . . . . . . .

97

 

 

Protocol Independent Multicast—Source

 

 

 

Specific Multicast . . . . . . . . . . . . . . . . .

97

 

 

Protocol Independent Multicast IPv6 Support . . .

97

 

 

MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . .

97

 

 

Contents

 

 

7

 

3 Hardware Overview . . . . . . . . . . . . . . . .

99

Dell Networking N1500 Series Switch

 

Hardware. . . . . . . . . . . . . . . . . . . . . . . . .

99

Front Panel . . . . . . . . . . . . . . . . . . . . .

99

Back Panel . . . . . . . . . . . . . . . . . . . .

103

LED Definitions . . . . . . . . . . . . . . . . . .

104

Power Consumption for PoE Switches . . . . . .

107

Dell Networking N2000 Series Switch

109

Hardware. . . . . . . . . . . . . . . . . . . . . . . .

Front Panel . . . . . . . . . . . . . . . . . . . .

109

Back Panel . . . . . . . . . . . . . . . . . . . .

112

LED Definitions . . . . . . . . . . . . . . . . . .

114

Power Consumption for PoE Switches . . . . . .

117

Dell Networking N3000 Series Switch

119

Hardware. . . . . . . . . . . . . . . . . . . . . . . .

Front Panel . . . . . . . . . . . . . . . . . . . .

119

Back Panel . . . . . . . . . . . . . . . . . . . .

123

LED Definitions . . . . . . . . . . . . . . . . . .

126

Power Consumption for PoE Switches . . . . . .

130

Dell Networking N4000 Series Switch

132

Hardware. . . . . . . . . . . . . . . . . . . . . . . .

Front Panel . . . . . . . . . . . . . . . . . . . .

132

Back Panel . . . . . . . . . . . . . . . . . . . .

136

LED Definitions . . . . . . . . . . . . . . . . . .

138

Switch MAC Addresses . . . . . . . . . . . . . . . .

142

8 Contents

4Using Dell OpenManage Switch

Administrator . . . . . . . . . . . . . . . . . . . . 145

About Dell OpenManage Switch Administrator . . . .

145

Starting the Application . . . . . . . . . . . . . . . . .

146

Understanding the Interface. . . . . . . . . . . . . . .

147

Using the Switch Administrator Buttons and Links. . . 149

Defining Fields . . . . . . . . . . . . . . . . . . . . . .

150

Understanding the Device View. . . . . . . . . . . . .

150

Using the Device View Port Features . . . . . . .

150

Using the Device View Switch Locator

 

Feature . . . . . . . . . . . . . . . . . . . . . . .

151

5 Using the Command-Line Interface . . . . 153

Accessing the Switch Through the CLI . . . . . . . . .

153

Console Connection . . . . . . . . . . . . . . . .

153

Telnet Connection . . . . . . . . . . . . . . . . .

154

Understanding Command Modes . . . . . . . . . . . .

155

Entering CLI Commands . . . . . . . . . . . . . . . . .

157

Using the Question Mark to Get Help . . . . . . .

157

Using Command Completion . . . . . . . . . . . .

158

Entering Abbreviated Commands . . . . . . . . .

158

Negating Commands . . . . . . . . . . . . . . . .

158

Command Output Paging . . . . . . . . . . . . . .

158

Understanding Error Messages . . . . . . . . . .

159

Recalling Commands from the History Buffer . . .

159

Contents 9

6Default Settings . . . . . . . . . . . . . . . . . . . 161

7Setting the IP Address and Other

Basic Network Information . . . . . . . . . . 165

IP Address and Network Information Overview . . .

165

What Is the Basic Network Information?. . . . .

165

Why Is Basic Network Information

 

Needed?. . . . . . . . . . . . . . . . . . . . . .

166

How Is Basic Network Information

 

Configured? . . . . . . . . . . . . . . . . . . . .

167

What Is Out-of-Band Management and

 

In-Band Management? . . . . . . . . . . . . . .

167

Default Network Information . . . . . . . . . . . . .

169

Configuring Basic Network Information (Web) . . . .

171

Out-of-Band Interface . . . . . . . . . . . . . .

171

IP Interface Configuration (Default VLAN

 

IP Address) . . . . . . . . . . . . . . . . . . . .

172

Route Entry Configuration (Switch Default

 

Gateway) . . . . . . . . . . . . . . . . . . . . .

174

Domain Name Server . . . . . . . . . . . . . . .

176

Default Domain Name . . . . . . . . . . . . . .

177

Host Name Mapping . . . . . . . . . . . . . . .

178

Dynamic Host Name Mapping . . . . . . . . . .

179

Configuring Basic Network Information (CLI) . . . . .

180

Enabling the DHCP Client on the OOB Port . . . .

180

Enabling the DHCP Client on the Default

 

VLAN . . . . . . . . . . . . . . . . . . . . . . .

180

Managing DHCP Leases . . . . . . . . . . . . .

181

Configuring Static Network Information on

 

the OOB Port . . . . . . . . . . . . . . . . . . .

182

Configuring Static Network Information

183

on the Default VLAN . . . . . . . . . . . . . . .

10 Contents

Configuring and Viewing Additional

Network Information . . . . . . . . . . . . . . . . 184

Basic Network Information Configuration

Examples. . . . . . . . . . . . . . . . . . . . . . . . . 186

Configuring Network Information Using

the OOB Port . . . . . . . . . . . . . . . . . . . . 186

Configuring Network Information Using the

Serial Interface . . . . . . . . . . . . . . . . . . . 187

8Managing QSFP Ports . . . . . . . . . . . . . . 191

9Stacking . . . . . . . . . . . . . . . . . . . . . . . . . 193

Stacking Overview . . . . . . . . . . . . . . . . . . .

193

Dell Networking N1500, N2000, N3000,

197

and N4000 Stacking Compatibility . . . . . . . . .

How is the Stack Master Selected? . . . . . . . .

198

Adding a Switch to the Stack. . . . . . . . . . . .

199

Removing a Switch from the Stack. . . . . . . . .

200

How is the Firmware Updated on the Stack? . . . 201

What is Stacking Standby? . . . . . . . . . . . . .

201

What is Nonstop Forwarding? . . . . . . . . . . .

201

Switch Stack MAC Addressing and Stack

 

Design Considerations . . . . . . . . . . . . . . .

205

NSF Network Design Considerations . . . . . . .

205

Why is Stacking Needed? . . . . . . . . . . . . .

206

Default Stacking Values . . . . . . . . . . . . . . . . .

206

Managing and Monitoring the Stack (Web) . . . . . .

207

Unit Configuration . . . . . . . . . . . . . . . . .

207

Stack Summary . . . . . . . . . . . . . . . . . . .

208

Stack Firmware Synchronization . . . . . . . . . .

209

Contents 11

Supported Switches . . . . . . . . . . . . . . .

210

Stack Port Summary . . . . . . . . . . . . . . .

211

Stack Port Counters. . . . . . . . . . . . . . . .

212

Stack Port Diagnostics . . . . . . . . . . . . . .

212

NSF Summary . . . . . . . . . . . . . . . . . . .

213

Checkpoint Statistics . . . . . . . . . . . . . . .

214

Managing the Stack (CLI) . . . . . . . . . . . . . . .

215

Configuring Stack Member, Stack Port, and

215

NSF Settings . . . . . . . . . . . . . . . . . . .

Viewing and Clearing Stacking and NSF

 

Information . . . . . . . . . . . . . . . . . . . .

217

Connecting to the Management Console

 

from a Stack Member. . . . . . . . . . . . . . .

217

Stacking and NSF Usage Scenarios. . . . . . . . . .

218

Basic Failover . . . . . . . . . . . . . . . . . . .

218

Preconfiguring a Stack Member . . . . . . . . .

220

NSF in the Data Center . . . . . . . . . . . . . .

222

NSF and VoIP . . . . . . . . . . . . . . . . . . .

223

NSF and DHCP Snooping . . . . . . . . . . . . .

224

NSF and the Storage Access Network . . . . . .

225

NSF and Routed Access . . . . . . . . . . . . .

227

10Authentication, Authorization, and

Accounting . . . . . . . . . . . . . . . . . . . . . . 229

AAA Introduction. . . . . . . . . . . . . . . . . . . .

229

Methods. . . . . . . . . . . . . . . . . . . . . .

230

Method Lists . . . . . . . . . . . . . . . . . . .

231

Access Lines . . . . . . . . . . . . . . . . . . .

232

Access Lines (AAA). . . . . . . . . . . . . . . .

233

Access Lines (Non-AAA) . . . . . . . . . . . . .

234

12 Contents

Authentication . . . . . . . . . . . . . . . . . . . . . .

235

Authentication Types . . . . . . . . . . . . . . . .

235

Authentication Manager . . . . . . . . . . . . . .

236

Using RADIUS . . . . . . . . . . . . . . . . . . .

241

Using TACACS+ Servers to Control

246

Management Access . . . . . . . . . . . . . . . .

Authentication Examples . . . . . . . . . . . . . .

248

Public Key SSH Authentication Example . . . . . .

256

Associating a User With an SSH Key . . . . . . .

263

Authorization. . . . . . . . . . . . . . . . . . . . . . .

265

Exec Authorization Capabilities . . . . . . . . . .

265

Authorization Examples. . . . . . . . . . . . . . .

267

RADIUS Change of Authorization. . . . . . . . . .

269

TACACS Authorization . . . . . . . . . . . . . . .

273

Accounting . . . . . . . . . . . . . . . . . . . . . . . .

277

 

 

RADIUS Accounting . . . . . . . . . . . . . . . .

277

 

 

IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . .

279

 

 

What is IEEE 802.1X? . . . . . . . . . . . . . . . .

279

 

 

What are the 802.1X Port Authentication

 

 

 

Modes? . . . . . . . . . . . . . . . . . . . . . . .

280

 

 

What is MAC-Based 802.1X Authentication? . . .

281

 

 

What is the Role of 802.1X in VLAN

 

 

 

Assignment? . . . . . . . . . . . . . . . . . . . .

282

 

 

What is Monitor Mode? . . . . . . . . . . . . . .

285

 

 

How Does the Authentication Server Assign

 

 

 

DiffServ Policy? . . . . . . . . . . . . . . . . . . .

286

 

 

What is the Internal Authentication Server? . . . . 287

Default 802.1X Values. . . . . . . . . . . . . . . .

287

 

 

Configuring IEEE 802.1X (Web) . . . . . . . . . . .

288

 

 

Captive Portal . . . . . . . . . . . . . . . . . . . . . .

313

 

 

Captive Portal Overview . . . . . . . . . . . . . .

313

 

 

Default Captive Portal Behavior and Settings . . .

321

 

 

Contents

 

 

13

 

Configuring Captive Portal (Web). . . . . . . . .

323

Configuring Captive Portal (CLI) . . . . . . . . .

341

Captive Portal Configuration Example . . . . . .

347

In Case Of Problems in Captive Portal

351

Deployment . . . . . . . . . . . . . . . . . . . .

11Monitoring and Logging System

Information . . . . . . . . . . . . . . . . . . . . . . 353

System Monitoring Overview . . . . . . . . . . . . .

353

What System Information Is Monitored? . . . . .

353

Why Is System Information Needed?. . . . . . .

354

Where Are Log Messages Sent? . . . . . . . . .

354

What Are the Severity Levels? . . . . . . . . . .

355

What Are the System Startup and Operation

355

Logs? . . . . . . . . . . . . . . . . . . . . . . .

What Is the Log Message Format? . . . . . . . .

356

What Factors Should Be Considered When

 

Configuring Logging? . . . . . . . . . . . . . . .

357

Default Log Settings . . . . . . . . . . . . . . . . . .

358

Monitoring System Information and Configuring

359

Logging (Web) . . . . . . . . . . . . . . . . . . . . .

Device Information . . . . . . . . . . . . . . . .

359

System Health. . . . . . . . . . . . . . . . . . .

361

System Resources . . . . . . . . . . . . . . . .

362

Unit Power Usage History . . . . . . . . . . . .

363

Integrated Cable Test for Copper Cables . . . . .

364

Optical Transceiver Diagnostics . . . . . . . . .

365

Log Global Settings . . . . . . . . . . . . . . . .

367

RAM Log . . . . . . . . . . . . . . . . . . . . .

368

Log File . . . . . . . . . . . . . . . . . . . . . .

369

Syslog Server . . . . . . . . . . . . . . . . . . .

369

Email Alert Global Configuration . . . . . . . . .

372

14 Contents

Email Alert Mail Server Configuration . . . . . . .

372

Email Alert Subject Configuration . . . . . . . . .

374

Email Alert To Address Configuration . . . . . . .

375

Email Alert Statistics . . . . . . . . . . . . . . . .

376

Monitoring System Information and Configuring

377

Logging (CLI) . . . . . . . . . . . . . . . . . . . . . . .

Viewing System Information and Enabling

377

the Locator LED . . . . . . . . . . . . . . . . . . .

Running Cable Diagnostics . . . . . . . . . . . . .

377

Configuring Local Logging . . . . . . . . . . . . .

379

Configuring Remote Logging . . . . . . . . . . . .

380

Configuring Mail Server Settings. . . . . . . . . .

381

Configuring Email Alerts for Log Messages . . . .

382

Logging Configuration Examples . . . . . . . . . . . .

384

Configuring Local and Remote Logging . . . . . .

384

Configuring Email Alerting . . . . . . . . . . . . .

386

12 Managing General System Settings . . .

389

System Settings Overview. . . . . . . . . . . . . . . .

389

Why Does System Information Need to Be

391

Configured? . . . . . . . . . . . . . . . . . . . . .

What Are SDM Templates? . . . . . . . . . . . .

391

Why is the System Time Needed? . . . . . . . . .

394

How Does SNTP Work? . . . . . . . . . . . . . .

394

What Configuration Is Required for Plug-In

 

Modules? . . . . . . . . . . . . . . . . . . . . . .

395

What Are the Key PoE Plus Features for the

 

Dell Networking N1524P/N1548P, N2024P/

 

N2048P, and N3024P/N3048P Switches? . . . . . .

396

Default General System Information . . . . . . . . . .

397

Power Management in Guard Band . . . . . . . .

397

Contents 15

Dynamic/Static Power Management Mode . . .

398

Class-Based Power Management Mode . . . . .

398

Configuring General System Settings (Web) . . .

398

System Information . . . . . . . . . . . . . . . .

398

CLI Banner . . . . . . . . . . . . . . . . . . . .

402

SDM Template Preference . . . . . . . . . . . .

403

Clock . . . . . . . . . . . . . . . . . . . . . . .

404

SNTP Global Settings . . . . . . . . . . . . . . .

405

SNTP Authentication . . . . . . . . . . . . . . .

406

SNTP Server . . . . . . . . . . . . . . . . . . .

408

Summer Time Configuration . . . . . . . . . . .

411

Time Zone Configuration . . . . . . . . . . . . .

412

Card Configuration . . . . . . . . . . . . . . . .

413

Slot Summary . . . . . . . . . . . . . . . . . . .

414

Supported Cards . . . . . . . . . . . . . . . . .

415

Power Over Ethernet Global Configuration

 

(Dell Networking N1524P/N1548P, N2024P/

416

N2048P, and N3024P/N3048P Only) . . . . . . . .

Power Over Ethernet Interface Configuration

 

(Dell Networking N1524P/N1548P, N2024P/

417

N2048P, and N3024P/N3048P Only) . . . . . . . .

Configuring System Settings (CLI) . . . . . . . . . . .

419

Configuring System Information . . . . . . . . .

419

Configuring the Banner . . . . . . . . . . . . . .

420

Managing the SDM Template . . . . . . . . . .

421

Configuring SNTP Authentication and an

421

SNTP Server . . . . . . . . . . . . . . . . . . .

Setting the System Time and Date Manually . . .

423

Configuring the Expansion Slots (Dell

424

Networking N3000 Series Only). . . . . . . . . .

Viewing Slot Information (Dell Networking

 

N4000 Series Only) . . . . . . . . . . . . . . . .

425

Configuring PoE Settings (Dell Networking

 

N1524P/N1548P, N2024P/N2048P, and N3024P/

 

N3048P Only) . . . . . . . . . . . . . . . . . . .

425

16 Contents

General System Settings Configuration

Examples. . . . . . . . . . . . . . . . . . . . . . . . .

427

Configuring System and Banner Information . . .

427

Configuring SNTP. . . . . . . . . . . . . . . . . .

430

Configuring the Time Manually . . . . . . . . . . .

432

13 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . .

433

SNMP Overview . . . . . . . . . . . . . . . . . . . . .

433

What Is SNMP?. . . . . . . . . . . . . . . . . . .

433

What Are SNMP Traps? . . . . . . . . . . . . . .

434

Why Is SNMP Needed? . . . . . . . . . . . . . .

435

Default SNMP Values . . . . . . . . . . . . . . . . . .

435

Configuring SNMP (Web) . . . . . . . . . . . . . . . .

437

SNMP Global Parameters . . . . . . . . . . . . .

437

SNMP View Settings . . . . . . . . . . . . . . . .

438

Access Control Group . . . . . . . . . . . . . . .

440

SNMPv3 User Security Model (USM) . . . . . . .

442

Communities . . . . . . . . . . . . . . . . . . . .

445

Notification Filter . . . . . . . . . . . . . . . . . .

447

Notification Recipients . . . . . . . . . . . . . . .

448

Trap Flags. . . . . . . . . . . . . . . . . . . . . .

450

OSPFv2 Trap Flags . . . . . . . . . . . . . . . . .

451

OSPFv3 Trap Flags . . . . . . . . . . . . . . . . .

452

Trap Log. . . . . . . . . . . . . . . . . . . . . . .

453

Configuring SNMP (CLI) . . . . . . . . . . . . . . . . .

455

Configuring the SNMPv3 Engine ID . . . . . . . .

455

Configuring SNMP Views, Groups, and Users . . . 456

Configuring Communities . . . . . . . . . . . . . .

459

Configuring SNMP Notifications (Traps

 

and Informs) . . . . . . . . . . . . . . . . . . . .

461

Contents 17

SNMP Configuration Examples . . . . . . . . . . . .

464

Configuring SNMPv1 and SNMPv2 . . . . . . . .

464

Configuring SNMPv3 . . . . . . . . . . . . . . .

465

14 Images and File Management . . . . . . . .

469

Image and File Management Overview . . . . . . . .

469

What Files Can Be Managed? . . . . . . . . . .

469

Why Is File Management Needed? . . . . . . . .

471

What Methods Are Supported for File

 

Management?. . . . . . . . . . . . . . . . . . .

474

What Factors Should Be Considered When

 

Managing Files?. . . . . . . . . . . . . . . . . .

474

How Is the Running Configuration Saved? . . . .

477

N3000 Dual Images. . . . . . . . . . . . . . . . . . .

477

Access Router/Switch Role. . . . . . . . . . . .

477

Aggregation Router Role . . . . . . . . . . . . .

478

Managing Images and Files (Web) . . . . . . . . . .

479

File System . . . . . . . . . . . . . . . . . . . .

479

Active Images. . . . . . . . . . . . . . . . . . .

480

USB Flash Drive . . . . . . . . . . . . . . . . . .

481

File Download . . . . . . . . . . . . . . . . . . .

482

File Upload . . . . . . . . . . . . . . . . . . . .

484

Copy Files . . . . . . . . . . . . . . . . . . . . .

486

Managing Images and Files (CLI) . . . . . . . . . . .

487

Downloading and Activating a New Image

487

(TFTP) . . . . . . . . . . . . . . . . . . . . . . .

Managing Files in Internal Flash . . . . . . . . .

489

Managing Files on a USB Flash Device . . . . .

490

Uploading a Configuration File (SCP) . . . . . . .

490

Managing Configuration Scripts (SFTP) . . . . .

491

18 Contents

File and Image Management Configuration

Examples. . . . . . . . . . . . . . . . . . . . . . . . .

492

Upgrading the Firmware . . . . . . . . . . . . . .

492

Managing Configuration Scripts . . . . . . . . . .

495

Managing Files by Using the USB Flash Drive . . .

497

15 DHCP and USB Auto-Configuration . . . . 499

Auto Configuration Overview . . . . . . . . . . . . . .

499

What Is USB Auto Configuration? . . . . . . . . .

500

What Files Does USB Auto Configuration

 

Use?. . . . . . . . . . . . . . . . . . . . . . . . .

500

How Does USB Auto Configuration Use the

 

Files on the USB Device? . . . . . . . . . . . . . .

501

What Is the Setup File Format?. . . . . . . . . . .

503

What Is the DHCP Auto Configuration

 

Process? . . . . . . . . . . . . . . . . . . . . . .

503

Monitoring and Completing the DHCP

 

Auto Configuration Process . . . . . . . . . . . .

509

What Are the Dependencies for DHCP

 

Auto Configuration? . . . . . . . . . . . . . . . .

510

Default Auto Configuration Values . . . . . . . . . . .

511

 

 

Managing Auto Configuration (Web) . . . . . . . . . .

512

 

 

Auto-Install Configuration . . . . . . . . . . . . .

512

 

 

Managing Auto Configuration (CLI) . . . . . . . . . . .

513

 

 

Managing Auto Configuration . . . . . . . . . . .

513

 

 

Auto Configuration Example. . . . . . . . . . . . . . .

514

 

 

Enabling USB Auto Configuration and Auto

514

 

 

Image Download . . . . . . . . . . . . . . . . . .

 

 

Enabling DHCP Auto Configuration and Auto

 

 

 

Image Download . . . . . . . . . . . . . . . . . .

515

 

 

Easy Firmware Upgrade via USB . . . . . . . . . .

517

 

 

Contents

 

 

19

 

 

 

16 Monitoring Switch Traffic . . . . . . . . . . .

519

 

 

Traffic Monitoring Overview. . . . . . . . . . . . . .

519

 

 

What is sFlow Technology?. . . . . . . . . . . .

519

 

 

What is RMON? . . . . . . . . . . . . . . . . . .

522

 

 

What is Port Mirroring? . . . . . . . . . . . . . .

523

 

 

Port Mirroring Behaviors . . . . . . . . . . . . .

524

 

 

Remote Capture . . . . . . . . . . . . . . . . . .

526

 

 

Why is Traffic Monitoring Needed? . . . . . . .

526

 

 

Default Traffic Monitoring Values . . . . . . . . . . .

526

 

 

Monitoring Switch Traffic (Web) . . . . . . . . . . .

527

 

 

sFlow Agent Summary . . . . . . . . . . . . . .

527

 

 

sFlow Receiver Configuration . . . . . . . . . .

528

 

 

sFlow Sampler Configuration . . . . . . . . . . .

529

 

 

sFlow Poll Configuration . . . . . . . . . . . . .

530

 

 

Interface Statistics . . . . . . . . . . . . . . . .

531

 

 

Etherlike Statistics . . . . . . . . . . . . . . . .

532

 

 

GVRP Statistics . . . . . . . . . . . . . . . . . .

533

 

 

EAP Statistics . . . . . . . . . . . . . . . . . . .

534

 

 

Utilization Summary. . . . . . . . . . . . . . . .

535

 

 

Counter Summary . . . . . . . . . . . . . . . . .

536

 

 

Switchport Statistics . . . . . . . . . . . . . . .

537

 

 

RMON Statistics . . . . . . . . . . . . . . . . .

538

 

 

RMON History Control Statistics . . . . . . . . .

539

 

 

RMON History Table . . . . . . . . . . . . . . .

541

 

 

RMON Event Control . . . . . . . . . . . . . . .

542

 

 

RMON Event Log . . . . . . . . . . . . . . . . .

544

 

 

RMON Alarms. . . . . . . . . . . . . . . . . . .

545

 

 

Port Statistics . . . . . . . . . . . . . . . . . . .

547

 

 

LAG Statistics . . . . . . . . . . . . . . . . . . .

548

 

 

Port Mirroring . . . . . . . . . . . . . . . . . . .

549

 

 

Monitoring Switch Traffic (CLI) . . . . . . . . . . . .

551

 

 

Configuring sFlow . . . . . . . . . . . . . . . . .

551

20

 

Contents

 

 

 

Configuring RMON . . . . . . . . . . . . . . . . .

553

Viewing Statistics. . . . . . . . . . . . . . . . . .

555

Configuring Port Mirroring . . . . . . . . . . . . .

556

Configuring RSPAN . . . . . . . . . . . . . . . . .

557

Traffic Monitoring Examples . . . . . . . . . . . . . .

560

Showing Interface Traffic . . . . . . . . . . . . .

560

Configuring sFlow. . . . . . . . . . . . . . . . . .

561

Configuring RMON . . . . . . . . . . . . . . . . .

563

Configuring Remote Capture . . . . . . . . . . . .

564

Configuring RSPAN . . . . . . . . . . . . . . . . .

569

17 iSCSI Optimization . . . . . . . . . . . . . . . . . 573

iSCSI Optimization Overview . . . . . . . . . . . . . . 573

What Does iSCSI Optimization Do?. . . . . . . . . 574

What Occurs When iSCSI Optimization Is

Enabled or Disabled? . . . . . . . . . . . . . . . . 574

How Does the Switch Detect iSCSI Traffic

Flows?. . . . . . . . . . . . . . . . . . . . . . . . 574

How Is Quality of Service Applied to iSCSI

Traffic Flows? . . . . . . . . . . . . . . . . . . . . 575

How Does iSCSI Optimization Use ACLs? . . . . . 576

What Information Does the Switch Track in

iSCSI Traffic Flows? . . . . . . . . . . . . . . . . 576

How Does iSCSI Optimization Interact With

Dell EqualLogic Arrays? . . . . . . . . . . . . . . 577

How Does iSCSI Optimization Interact with

Dell Compellent Arrays? . . . . . . . . . . . . . . 577

How Does iSCSI Optimization Interact with

DCBx? . . . . . . . . . . . . . . . . . . . . . . . . 578

iSCSI CoS and Priority Flow Control/Enhanced Transmission Selection Interactions . . . . . . . . 579

Default iSCSI Optimization Values . . . . . . . . . . . 580

Contents 21

Configuring iSCSI Optimization (Web). . . . . . . . .

581

iSCSI Global Configuration . . . . . . . . . . . .

581

iSCSI Targets Table . . . . . . . . . . . . . . . .

582

iSCSI Sessions Table . . . . . . . . . . . . . . .

583

iSCSI Sessions Detailed . . . . . . . . . . . . .

584

Configuring iSCSI Optimization (CLI) . . . . . . . . .

585

iSCSI Optimization Configuration Examples . . . . .

587

Configuring iSCSI Optimization Between

587

Servers and a Disk Array . . . . . . . . . . . . .

18 Port Characteristics . . . . . . . . . . . . . . .

591

Port Overview . . . . . . . . . . . . . . . . . . . . .

591

What Physical Port Characteristics Can

591

Be Configured? . . . . . . . . . . . . . . . . . .

Auto-Negotiation . . . . . . . . . . . . . . . . .

593

Maximum Transmission Unit . . . . . . . . . . .

593

What is Link Dependency? . . . . . . . . . . . .

594

What Interface Types are Supported? . . . . . .

596

What is Interface Configuration Mode? . . . . .

596

What Are the Green Ethernet Features? . . . . .

598

Switchport Modes . . . . . . . . . . . . . . . .

599

Default Port Values . . . . . . . . . . . . . . . . . .

600

Configuring Port Characteristics (Web) . . . . . . . .

601

Port Configuration. . . . . . . . . . . . . . . . .

601

Link Dependency Configuration . . . . . . . . .

604

Link Dependency Summary. . . . . . . . . . . .

606

Port Green Ethernet Configuration . . . . . . . .

607

Port Green Ethernet Statistics . . . . . . . . . .

608

Port Green Ethernet LPI History . . . . . . . . .

610

22 Contents

 

Configuring Port Characteristics (CLI) . . . .

.

. . . .

611

 

 

 

Configuring Port Settings . . . . . . . . .

.

. . . .

611

 

 

 

Configuring Link Dependencies . . . . .

.

. . . .

613

 

 

 

Configuring Green Features . . . . . . .

.

. . . .

614

 

 

 

Port Configuration Examples . . . . . . . . .

.

. . . .

615

 

 

 

Configuring Port Settings . . . . . . . . .

.

. . . .

615

 

 

 

Configuring a Link Dependency Groups .

.

. . . .

616

 

 

 

Configuring a Port in Access Mode . . .

.

. . . .

616

 

 

 

Configuring a Port in Trunk Mode . . . .

.

. . . .

617

 

 

 

Configuring a Port in General Mode . . .

.

. . . .

620

 

 

19

Port and System Security . . . . . . .

.

. . .

623

 

 

 

Port-based Security—Port MAC Locking . . .

.

. . . .

623

 

 

 

Denial of Service . . . . . . . . . . . . . . .

.

. . . .

628

 

 

20

Access Control Lists . . . . . . . . . . .

.

. . .

629

 

 

 

ACL Overview . . . . . . . . . . . . . . . . .

.

. . . .

629

 

 

 

ACL Counters . . . . . . . . . . . . . . .

.

. . . .

631

 

 

 

What Are MAC ACLs? . . . . . . . . . .

.

. . . .

631

 

 

 

What Are IP ACLs? . . . . . . . . . . . .

.

. . . .

632

 

 

 

ACL Actions. . . . . . . . . . . . . . . .

.

. . . .

632

 

 

 

What Is the ACL Redirect Function? . . .

.

. . . .

633

 

 

 

What Is the ACL Mirror Function? . . . .

.

. . . .

634

 

 

 

What Is ACL Logging . . . . . . . . . . .

.

. . . .

634

 

 

 

What Are Time-Based ACLs? . . . . . .

.

. . . .

634

 

 

 

ACL Limitations . . . . . . . . . . . . . .

.

. . . .

635

 

 

 

ACL Configuration Details . . . . . . . . . . .

.

. . . .

639

 

 

 

How Are ACLs Configured?. . . . . . . .

.

. . . .

639

 

 

 

Editing Access Lists . . . . . . . . . . .

.

. . . .

639

 

 

 

 

 

Contents

 

23

 

 

 

 

Preventing False ACL Matches . . . . . . . . . .

640

Using IP and MAC Address Masks . . . . . . . .

641

Policy-Based Routing . . . . . . . . . . . . . . . . .

643

Packet Classification . . . . . . . . . . . . . . .

643

Route-Map Processing . . . . . . . . . . . . . .

644

Route-Map Actions . . . . . . . . . . . . . . . .

645

Interface ACLs and PBR Interaction . . . . . . .

647

PBR and Implicit Deny-all. . . . . . . . . . . . .

648

Limitations. . . . . . . . . . . . . . . . . . . . .

648

Configuring ACLs (Web) . . . . . . . . . . . . . . . .

651

IP ACL Configuration . . . . . . . . . . . . . . .

651

IP ACL Rule Configuration . . . . . . . . . . . .

653

MAC ACL Configuration. . . . . . . . . . . . . .

655

MAC ACL Rule Configuration . . . . . . . . . . .

657

IPv6 ACL Configuration . . . . . . . . . . . . . .

658

IPv6 ACL Rule Configuration . . . . . . . . . . .

659

ACL Binding Configuration . . . . . . . . . . . .

661

Time Range Entry Configuration . . . . . . . . .

662

Configuring ACLs (CLI) . . . . . . . . . . . . . . . . .

664

Configuring an IPv4 ACL . . . . . . . . . . . . .

664

Configuring a MAC ACL . . . . . . . . . . . . . .

670

Configuring an IPv6 ACL . . . . . . . . . . . . .

674

Configuring a Time Range . . . . . . . . . . . .

677

ACL Configuration Examples. . . . . . . . . . . . . .

679

Basic Rules . . . . . . . . . . . . . . . . . . . .

679

Internal System ACLs . . . . . . . . . . . . . . .

680

Complete ACL Example . . . . . . . . . . . . . .

681

Advanced Examples . . . . . . . . . . . . . . .

685

Policy-Based Routing Examples . . . . . . . . .

697

24 Contents

21 VLANs . . . . . . . . . . . . . . . . . . . . .

.

.

. . . 701

 

 

VLAN Overview . . . . . . . . . . . . . . .

.

.

. . . .

701

 

 

VLAN Tagging . . . . . . . . . . . . .

.

.

. . . .

704

 

 

GVRP . . . . . . . . . . . . . . . . . .

.

.

. . . .

705

 

 

Double-VLAN Tagging . . . . . . . . .

.

.

. . . .

705

 

 

Voice VLAN . . . . . . . . . . . . . . .

.

.

. . . .

707

 

 

Private VLANs . . . . . . . . . . . . .

.

.

. . . .

709

 

 

Additional VLAN Features . . . . . . .

.

.

. . . .

715

 

 

Default VLAN Behavior . . . . . . . . . . .

.

.

. . . .

716

 

 

Configuring VLANs (Web) . . . . . . . . . .

.

.

. . . .

718

 

 

VLAN Membership . . . . . . . . . . .

.

.

. . . .

718

 

 

VLAN Port Settings . . . . . . . . . . .

.

.

. . . .

723

 

 

VLAN LAG Settings . . . . . . . . . . .

.

.

. . . .

724

 

 

Bind MAC to VLAN . . . . . . . . . . .

.

.

. . . .

726

 

 

Bind IP Subnet to VLAN . . . . . . . .

.

.

. . . .

727

 

 

GVRP Parameters. . . . . . . . . . . .

.

.

. . . .

728

 

 

Protocol Group . . . . . . . . . . . . .

.

.

. . . .

730

 

 

Adding a Protocol Group . . . . . . . .

.

.

. . . .

731

 

 

Double VLAN Global Configuration. . .

.

.

. . . .

733

 

 

Double VLAN Interface Configuration .

.

.

. . . .

734

 

 

Voice VLAN . . . . . . . . . . . . . . .

.

.

. . . .

736

 

 

Configuring VLANs (CLI) . . . . . . . . . . .

.

.

. . . .

737

 

 

Creating a VLAN . . . . . . . . . . . .

.

.

. . . .

737

 

 

Configuring VLAN Settings for a LAG .

.

.

. . . .

738

 

 

Configuring Double VLAN Tagging . . .

.

.

. . . .

739

 

 

Configuring MAC-Based VLANs . . . .

.

.

. . . .

742

 

 

Configuring IP-Based VLANs. . . . . .

.

.

. . . .

744

 

 

Configuring a Protocol-Based VLAN . .

.

.

. . . .

746

 

 

Configuring GVRP. . . . . . . . . . . .

.

.

. . . .

749

 

 

Configuring Voice VLANs. . . . . . . .

.

.

. . . .

751

 

 

Configuring a Voice VLAN (Extended

 

 

 

753

 

 

Example) . . . . . . . . . . . . . . . .

.

.

. . . .

 

 

 

 

 

Contents

 

 

25

 

 

 

 

Enterprise Voice VLAN Configuration

With QoS . . . . . . . . . . . . . . . . . . . . .

754

MLAG with RPVST and Voice VLAN . . . . . . .

756

Assigning an 802.1p Priority to VLAN Traffic . . .

763

Configuring a Private VLAN. . . . . . . . . . . .

763

VLAN Configuration Examples. . . . . . . . . . . . .

766

Configuring VLANs Using The Dell

766

OpenManage Administrator . . . . . . . . . . .

Configuring VLANs Using the CLI . . . . . . . . .

774

 

 

22 Spanning Tree Protocol . . . . . . . . . . . . .

779

 

 

STP Overview . . . . . . . . . . . . . . . . . . . . .

779

 

 

What Are Classic STP, Multiple STP, and

779

 

 

Rapid STP? . . . . . . . . . . . . . . . . . . . .

 

 

How Does STP Work? . . . . . . . . . . . . . .

780

 

 

How Does MSTP Operate in the Network?. . . .

781

 

 

MSTP with Multiple Forwarding Paths . . . . . .

785

 

 

MSTP and VLAN IDs . . . . . . . . . . . . . . .

786

 

 

What are the Optional STP Features? . . . . . .

786

 

 

RSTP-PV . . . . . . . . . . . . . . . . . . . . . . . .

788

 

 

DirectLink Rapid Convergence . . . . . . . . . .

789

 

 

IndirectLink Rapid Convergence Feature. . . . .

791

 

 

Interoperability Between STP-PV and

793

 

 

RSTP-PV Modes . . . . . . . . . . . . . . . . .

 

 

Interoperability With IEEE Spanning Tree

 

 

 

Protocols . . . . . . . . . . . . . . . . . . . . .

793

 

 

Configuration Examples. . . . . . . . . . . . . .

798

 

 

Default STP Values. . . . . . . . . . . . . . . . . . .

799

 

 

Configuring Spanning Tree (Web) . . . . . . . . . . .

800

 

 

STP Global Settings . . . . . . . . . . . . . . . .

800

 

 

STP Port Settings . . . . . . . . . . . . . . . . .

802

26

 

Contents

 

 

 

STP LAG Settings . . . . . . . . . . . . . . . . . .

804

Rapid Spanning Tree . . . . . . . . . . . . . . . .

805

MSTP Settings . . . . . . . . . . . . . . . . . . .

807

MSTP Interface Settings . . . . . . . . . . . . . .

809

Configuring Spanning Tree (CLI) . . . . . . . . . . . .

810

Configuring Global STP Bridge Settings . . . . . .

810

Configuring Optional STP Features. . . . . . . . .

811

Configuring STP Interface Settings . . . . . . . .

812

Configuring MSTP Switch Settings. . . . . . . . .

813

Configuring MSTP Interface Settings . . . . . . .

814

STP Configuration Examples . . . . . . . . . . . . . .

815

STP Configuration Example. . . . . . . . . . . . .

815

MSTP Configuration Example . . . . . . . . . . .

817

RSTP-PV Access Switch Configuration

 

Example . . . . . . . . . . . . . . . . . . . . . . .

820

23 Discovering Network Devices . . . . . . . . 825

Device Discovery Overview . . . . . . . . . . . . . . .

825

What Is ISDP? . . . . . . . . . . . . . . . . . . .

825

What is LLDP? . . . . . . . . . . . . . . . . . . .

825

What is LLDP-MED? . . . . . . . . . . . . . . . .

826

Why are Device Discovery Protocols

 

Needed? . . . . . . . . . . . . . . . . . . . . . .

826

Default IDSP and LLDP Values . . . . . . . . . . . . .

827

Configuring ISDP and LLDP (Web) . . . . . . . . . . .

829

ISDP Global Configuration . . . . . . . . . . . . .

829

ISDP Cache Table . . . . . . . . . . . . . . . . .

830

ISDP Interface Configuration. . . . . . . . . . . .

831

ISDP Statistics . . . . . . . . . . . . . . . . . . .

832

LLDP Configuration . . . . . . . . . . . . . . . . .

833

Contents 27

LLDP Statistics . . . . . . . . . . . . . . . . . .

835

LLDP Connections. . . . . . . . . . . . . . . . .

836

LLDP-MED Global Configuration . . . . . . . . .

838

LLDP-MED Interface Configuration. . . . . . . .

839

LLDP-MED Local Device Information. . . . . . .

840

LLDP-MED Remote Device Information . . . . .

840

Configuring ISDP and LLDP (CLI) . . . . . . . . . . .

841

Configuring Global ISDP Settings. . . . . . . . .

841

Enabling ISDP on a Port . . . . . . . . . . . . .

842

Viewing and Clearing ISDP Information . . . . .

842

Configuring Global LLDP Settings. . . . . . . . .

843

Configuring Port-based LLDP Settings . . . . . .

843

Viewing and Clearing LLDP Information . . . . .

844

Configuring LLDP-MED Settings . . . . . . . . .

845

Viewing LLDP-MED Information . . . . . . . . .

846

Device Discovery Configuration Examples . . . . . .

846

Configuring ISDP . . . . . . . . . . . . . . . . .

846

Configuring LLDP . . . . . . . . . . . . . . . . .

847

 

 

24 Port-Based Traffic Control . . . . . . . . . .

849

 

 

Port-Based Traffic Control Overview . . . . . . . . .

849

 

 

What is Flow Control?. . . . . . . . . . . . . . .

850

 

 

What is Storm Control? . . . . . . . . . . . . . .

850

 

 

What are Protected Ports? . . . . . . . . . . . .

851

 

 

What is Error Recovery? . . . . . . . . . . . . .

851

 

 

What is Link Local Protocol Filtering? . . . . . .

851

 

 

What is Loop Protection? . . . . . . . . . . . . .

853

 

 

Default Port-Based Traffic Control Values . . . . . .

854

 

 

Configuring Port-Based Traffic Control (Web) . . . .

855

 

 

Flow Control (Global Port Parameters) . . . . . .

855

28

 

Contents

 

 

 

Storm Control . . . . . . . . . . . . . . . . . . . .

856

Protected Port Configuration . . . . . . . . . . . .

858

LLPF Configuration . . . . . . . . . . . . . . . . .

860

Configuring Port-Based Traffic Control (CLI) . . . . . .

862

Configuring Flow Control and Storm Control . . . . 862

Configuring Protected Ports . . . . . . . . . . . .

863

Configuring LLPF . . . . . . . . . . . . . . . . . .

864

Port-Based Traffic Control Configuration

 

Example . . . . . . . . . . . . . . . . . . . . . . . . .

865

25 Layer-2 Multicast Features . . . . . . . .

. .

867

L2 Multicast Overview. . . . . . . . . . . . . . .

. . .

867

Multicast Flooding and Forwarding . . . . .

. . .

867

What Are the Multicast Bridging Features? .

. . .

868

What Is L2 Multicast Traffic?. . . . . . . . .

. . .

869

What Is IGMP Snooping?. . . . . . . . . . .

. . .

869

What Is MLD Snooping? . . . . . . . . . . .

. . .

871

What Is Multicast VLAN Registration? . . . .

. . .

873

When Are Layer-3 Multicast Features

 

 

Required? . . . . . . . . . . . . . . . . . . .

. . .

874

What Are GARP and GMRP? . . . . . . . . .

. . .

874

Snooping Switch Restrictions. . . . . . . . . . .

. . .

876

MAC Address-Based Multicast Group . . . .

. . .

876

Topologies Where the Multicast Source

Is Not Directly Connected to the Querier. . . . . . 876

Using Static Multicast MAC Configuration. . . . .

876

 

 

IGMP Snooping and GMRP. . . . . . . . . . . . .

876

 

 

Default L2 Multicast Values . . . . . . . . . . . . . . .

877

 

 

Configuring L2 Multicast Features (Web) . . . . . . . .

879

 

 

Multicast Global Parameters . . . . . . . . . . . .

879

 

 

Contents

 

 

29

 

Bridge Multicast Group . . . . . . . . . . . . . .

880

MRouter Status . . . . . . . . . . . . . . . . . .

883

General IGMP Snooping . . . . . . . . . . . . .

884

Global Querier Configuration . . . . . . . . . . .

887

VLAN Querier . . . . . . . . . . . . . . . . . . .

888

VLAN Querier Status . . . . . . . . . . . . . . .

890

MFDB IGMP Snooping Table . . . . . . . . . . .

891

MLD Snooping General . . . . . . . . . . . . . .

892

MLD Snooping Global Querier Configuration. . .

894

MLD Snooping VLAN Querier. . . . . . . . . . .

895

MLD Snooping VLAN Querier Status . . . . . . .

897

MFDB MLD Snooping Table . . . . . . . . . . .

898

MVR Global Configuration . . . . . . . . . . . .

899

MVR Members . . . . . . . . . . . . . . . . . .

900

MVR Interface Configuration . . . . . . . . . . .

901

MVR Statistics . . . . . . . . . . . . . . . . . .

903

GARP Timers . . . . . . . . . . . . . . . . . . .

904

GMRP Parameters . . . . . . . . . . . . . . . .

906

MFDB GMRP Table . . . . . . . . . . . . . . . .

908

Configuring L2 Multicast Features (CLI) . . . . . . . .

909

Configuring Layer-2 Multicasting . . . . . . . . .

909

Configuring IGMP Snooping on VLANs. . . . . .

910

Configuring IGMP Snooping Querier . . . . . . .

911

Configuring MLD Snooping on VLANs . . . . . .

912

Configuring MLD Snooping Querier . . . . . . .

913

Configuring MVR . . . . . . . . . . . . . . . . .

914

Configuring GARP Timers and GMRP. . . . . . .

916

Case Study on a Real-World Network Topology . . .

917

Multicast Snooping Case Study . . . . . . . . .

917

30 Contents

Loading...
+ 1678 hidden pages