Dell PowerConnect
8024, 8024F, 8132, 8132F, 8164,
and 8164F Switch
User’s Configuration
Guide
Regulatory Models: PC8024, PC8024F,
PC8132, PC8132F, PC8164, PC8164F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
© 2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dellâ„¢, the DELL logo, EqualLogicâ„¢, PowerConnectâ„¢, and
OpenManageâ„¢ are trademarks of Dell Inc. Microsoft
and Windows Vista
United States and/or other countries. sFlow
is a registered trademark of Cisco Systems. Mozilla
Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
®
are either trademarks or registered trademarks of Microsoft Corporation in the
®
is a registered trademark of InMon Corporation. Cisco®
®
, Windows®, Windows Server®, MS-DOS®,
®
and Firefox® are registered trademarks of the
Regulatory Models: PC8024, PC8024F, PC8132, PC8132F, PC8164, PC8164F
June 2012 Rev. A03
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation
. . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options
System Time Management . . . . . . . . . . . . . 54
Log Messages
Integrated DHCP Server . . . . . . . . . . . . . . 55
Management of Basic Network Information. . . . 55
IPv6 Management Features . . . . . . . . . . . . 55
Dual Software Images . . . . . . . . . . . . . . . 55
File Management
Switch Database Management Templates. . . . . 56
Automatic Installation of Firmware and
Configuration
sFlow . . . . . . . . . . . . . . . . . . . . . . . . 57
SNMP Alarms and Trap Logs . . . . . . . . . . . . 57
CDP Interoperability through ISDP
Remote Monitoring (RMON) . . . . . . . . . . . . 57
Stacking Features . . . . . . . . . . . . . . . . . . . . 58
High Port Count
. . . . . . . . . . . . . . . . . . . 54
. . . . . . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . . . . 58
. . . . . . . . . . . 54
. . . . . . . . . 57
Contents 3
Single IP Management . . . . . . . . . . . . . . . 58
Automatic Firmware Update for New Stack M
. . . . . . . . . . . . . . . . . . . . . . . 58
embers
Master Failover with Transparent Transition
Nonstop Forwarding on the Stack
. . . . . . . . . 59
. . . . 59
Hot Add/Delete and Firmware
Synchronization
. . . . . . . . . . . . . . . . . . . 59
Security Features . . . . . . . . . . . . . . . . . . . . 59
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 59
Profiles
Password-Protected Management Access . . . . 60
Strong Password Enforcement
. . . . . . . . . . . 60
TACACS+ Client . . . . . . . . . . . . . . . . . . . 60
RADIUS Support . . . . . . . . . . . . . . . . . . 60
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 61
Inbound Telnet Control . . . . . . . . . . . . . . . 61
Denial of Service . . . . . . . . . . . . . . . . . . 61
Port Protection
. . . . . . . . . . . . . . . . . . . 61
Captive Portal . . . . . . . . . . . . . . . . . . . . 62
Dot1x Authentication (IEEE 802.1X) . . . . . . . . . 62
MAC-Based 802.1X Authentication
. . . . . . . . . 62
Dot1x Monitor Mode . . . . . . . . . . . . . . . . 63
MAC-Based Port Security . . . . . . . . . . . . . 63
Access Control Lists (ACL)
. . . . . . . . . . . . . 63
Time-Based ACLs . . . . . . . . . . . . . . . . . . 64
IP Source Guard (IPSG)
DHCP Snooping
. . . . . . . . . . . . . . . 64
. . . . . . . . . . . . . . . . . . . 64
Dynamic ARP Inspection . . . . . . . . . . . . . . 64
Protected Ports (Private VLAN Edge). . . . . . . . 65
4 Contents
Switching Features . . . . . . . . . . . . . . . . . . . 65
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 65
Head of Line Blocking Prevention . . . . . . . . . 65
Alternate Store and Forward (ASF)
. . . . . . . . . 65
Jumbo Frames Support . . . . . . . . . . . . . . . 66
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 66
VLAN-Aware MAC-based Switching. . . . . . . . 66
Back Pressure Support
. . . . . . . . . . . . . . . 66
Auto Negotiation . . . . . . . . . . . . . . . . . . 67
Broadcast Storm Control . . . . . . . . . . . . . . 67
Port Mirroring
. . . . . . . . . . . . . . . . . . . . 67
Static and Dynamic MAC Address Tables . . . . . 68
Link Layer Discovery Protocol (LLDP) . . . . . . . 68
Link Layer Discovery Protocol (LLDP) for
Media Endpoint Devices
. . . . . . . . . . . . . . 68
Priority-based Flow Control (PFC) . . . . . . . . . 68
Data Center Bridging Exchange (DBCx)
Protocol
. . . . . . . . . . . . . . . . . . . . . . . 69
Enhanced Transmission Selection . . . . . . . . . 69
Fibre Channel over Ethernet (FCoE)
Initialization Protocol Snooping
. . . . . . . . . . 69
Cisco Protocol Filtering . . . . . . . . . . . . . . . 70
DHCP Layer 2 Relay
. . . . . . . . . . . . . . . . . 70
Virtual Local Area Network Supported Features
VLAN Support
Port-Based VLANs
. . . . . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . . . 70
. . . . 70
IP Subnet-based VLAN . . . . . . . . . . . . . . . 71
MAC-based VLAN . . . . . . . . . . . . . . . . . 71
IEEE 802.1v Protocol-Based VLANs
. . . . . . . . 71
GARP and GVRP Support . . . . . . . . . . . . . . 71
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 71
Guest VLAN
. . . . . . . . . . . . . . . . . . . . . 72
Double VLANs . . . . . . . . . . . . . . . . . . . 72
Spanning Tree Protocol Features . . . . . . . . . . . . 73
Spanning Tree Protocol (STP)
. . . . . . . . . . . 73
Spanning Tree Port Settings . . . . . . . . . . . . 73
Rapid Spanning Tree . . . . . . . . . . . . . . . . 73
Contents 5
Multiple Spanning Tree . . . . . . . . . . . . . . . 73
Bridge Protocol Data Unit (BPDU) Guard. . . . . . 74
BPDU Filtering . . . . . . . . . . . . . . . . . . . 74
Link Aggregation Features
Link Aggregation
Link Aggregate Control Protocol (LACP)
Routing Features
. . . . . . . . . . . . . . . . . . . . . 76
. . . . . . . . . . . . . . . . 74
. . . . . . . . . . . . . . . . . . 74
. . . . . . 74
Address Resolution Protocol (ARP) Table
Management . . . . . . . . . . . . . . . . . . . . 76
VLAN Routing . . . . . . . . . . . . . . . . . . . . 76
IP Configuration . . . . . . . . . . . . . . . . . . . 76
Open Shortest Path First (OSPF)
. . . . . . . . . . 76
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 77
IP Helper and UDP Relay . . . . . . . . . . . . . . 77
Routing Information Protocol . . . . . . . . . . . . 77
Router Discovery . . . . . . . . . . . . . . . . . . 77
Routing Table
. . . . . . . . . . . . . . . . . . . . 77
Virtual Router Redundancy Protocol (VRRP) . . . . 78
Tunnel and Loopback Interfaces . . . . . . . . . . 78
IPv6 Routing Features . . . . . . . . . . . . . . . . . . 78
IPv6 Configuration
. . . . . . . . . . . . . . . . . 78
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 79
. . . . . . . . . . . . . . . . . . . . . . . 79
OSPFv3
DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 79
6 Contents
Quality of Service (QoS) Features . . . . . . . . . . . . 80
Differentiated Services (DiffServ)
. . . . . . . . . 80
Class Of Service (CoS) . . . . . . . . . . . . . . . 80
Auto Voice over IP (VoIP) . . . . . . . . . . . . . . 80
Internet Small Computer System Interface
(iSCSI) Optimization
. . . . . . . . . . . . . . . . . 81
Layer 2 Multicast Features . . . . . . . . . . . . . . . 81
MAC Multicast Support
. . . . . . . . . . . . . . . 81
IGMP Snooping . . . . . . . . . . . . . . . . . . . 81
IGMP Snooping Querier . . . . . . . . . . . . . . 82
MLD Snooping
. . . . . . . . . . . . . . . . . . . 82
Multicast VLAN Registration . . . . . . . . . . . . 82
Layer 3 Multicast Features . . . . . . . . . . . . . . . 83
Distance Vector Multicast Routing Protocol
. . . . 83
Internet Group Management Protocol . . . . . . . 83
IGMP Proxy . . . . . . . . . . . . . . . . . . . . . 83
Protocol Independent Multicast—
Dense Mode
. . . . . . . . . . . . . . . . . . . . 83
Protocol Independent Multicast—
Sparse Mode
. . . . . . . . . . . . . . . . . . . . 84
Protocol Independent Multicast—Source
Specific Multicast
Protocol Independent Multicast IPv6 Support
. . . . . . . . . . . . . . . . . 84
. . . 84
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . . 84
3 Hardware Overview. . . . . . . . . . . . . . . . . 85
PowerConnect 8000-series and 8100-series
Front Panel
. . . . . . . . . . . . . . . . . . . . . . . . 85
PowerConnect 8024 Front Panel
PowerConnect 8024F Front Panel
PowerConnect 8132 Front Panel
. . . . . . . . . . 85
. . . . . . . . . 86
. . . . . . . . . . 87
PowerConnect 8132F Front Panel . . . . . . . . . 87
PowerConnect 8164 Front Panel . . . . . . . . . . 88
PowerConnect 8164F Front Panel
. . . . . . . . . 89
Hot-Pluggable Interface Modules . . . . . . . . . 90
USB Port (Power Connect 8100-series
switches only)
. . . . . . . . . . . . . . . . . . . 92
Port and System LEDs . . . . . . . . . . . . . . . 92
Contents 7
PowerConnect 8000-series and 8100-series
Back Panel
. . . . . . . . . . . . . . . . . . . . . . . . 92
Console Port
. . . . . . . . . . . . . . . . . . . . 93
Out-of-Band Management Port. . . . . . . . . . . 93
Power Supplies
. . . . . . . . . . . . . . . . . . . 93
Ventilation System . . . . . . . . . . . . . . . . . 94
LED Definitions. . . . . . . . . . . . . . . . . . . . . . 95
Port LEDs
. . . . . . . . . . . . . . . . . . . . . . 95
System LEDs . . . . . . . . . . . . . . . . . . . . 96
Switch Addresses . . . . . . . . . . . . . . . . . . . . 97
4 Using Dell OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 101
About Dell OpenManage Switch Administrator. . . . 101
5 Using the Command-Line Interface . . . . 107
8 Contents
Starting the Application
. . . . . . . . . . . . . . . . 102
Understanding the Interface . . . . . . . . . . . . . . 103
Defining Fields . . . . . . . . . . . . . . . . . . . . . 105
Understanding the Device View
Using the Device View Port Features
. . . . . . . . . . . . 106
. . . . . . . 106
Accessing the Switch Through the CLI . . . . . . . . 107
Console Connection
. . . . . . . . . . . . . . . . 107
Telnet Connection. . . . . . . . . . . . . . . . . 108
Understanding Command Modes . . . . . . . . . . . . 109
Entering CLI Commands
Using the Question Mark to Get Help
Using Command Completion
. . . . . . . . . . . . . . . . . 111
. . . . . . . 111
. . . . . . . . . . . . 112
Entering Abbreviated Commands . . . . . . . . . 112
Negating Commands . . . . . . . . . . . . . . . . 112
Understanding Error Messages
. . . . . . . . . . 113
Recalling Commands from the History Buffer . . . 113
6 Default Settings. . . . . . . . . . . . . . . . . . . 115
7 Setting the IP Address and Other
Basic Network Information . . . . . . . . . . 119
IP Address and Network Information Overview . . . . 119
What Is the Basic Network Information?
Why Is Basic Network Information Needed? . . . 120
How Is Basic Network Information
Configured?
. . . . . . . . . . . . . . . . . . . . . 121
What Is Out-of-Band Management and
In-Band Management?
. . . . . . . . . . . . . . . 121
. . . . . 119
Default Network Information
. . . . . . . . . . . . . . 123
Configuring Basic Network Information (Web) . . . . . 124
Out-of-Band Interface
. . . . . . . . . . . . . . . 124
IP Interface Configuration (Default VLAN
IP Address)
. . . . . . . . . . . . . . . . . . . . . 125
Route Entry Configuration (Switch Default
Gateway)
Domain Name Server
Default Domain Name
. . . . . . . . . . . . . . . . . . . . . . 126
. . . . . . . . . . . . . . . . 128
. . . . . . . . . . . . . . . 129
Host Name Mapping . . . . . . . . . . . . . . . . 130
Contents 9
Dynamic Host Name Mapping . . . . . . . . . . 131
Configuring Basic Network Information (CLI)
Enabling the DHCP Client on the OOB Port
. . . . . 132
. . . . 132
Enabling the DHCP Client on the Default
. . . . . . . . . . . . . . . . . . . . . . . 132
VLAN
Managing DHCP Leases . . . . . . . . . . . . . 133
Configuring Static Network Information on the
OOB Port
. . . . . . . . . . . . . . . . . . . . . 134
Configuring Static Network Information on the
Default VLAN
. . . . . . . . . . . . . . . . . . . 134
Configuring and Viewing Additional Network
Information
. . . . . . . . . . . . . . . . . . . . 135
Basic Network Information Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 136
8 Managing QSFP Ports . . . . . . . . . . . . . . 139
9 Managing a Switch Stack . . . . . . . . . . . 141
Stacking Overview . . . . . . . . . . . . . . . . . . . 141
Creating a PowerConnect 8000/8100 Series
Stack . . . . . . . . . . . . . . . . . . . . . . . 142
How is the Stack Master Selected? . . . . . . . 144
Adding a Switch to the Stack
Removing a Switch from the Stack
How is the Firmware Updated on the Stack? . . . 147
What is Stacking Standby? . . . . . . . . . . . . 147
What is Nonstop Forwarding?
Switch Stack MAC Addressing and Stack
Design Considerations
NSF Network Design Considerations
Why is Stacking Needed? . . . . . . . . . . . . 151
. . . . . . . . . . . 145
. . . . . . . . 146
. . . . . . . . . . 147
. . . . . . . . . . . . . . 150
. . . . . . . 151
10 Contents
Default Stacking Values . . . . . . . . . . . . . . . . . 152
Managing and Monitoring the Stack (Web)
Unit Configuration
Stack Summary
. . . . . . . . . . . . . . . . . 153
. . . . . . . . . . . . . . . . . . . 155
. . . . . . . 153
Stack Firmware Synchronization . . . . . . . . . . 156
Supported Switches . . . . . . . . . . . . . . . . 157
Stack Port Summary
. . . . . . . . . . . . . . . . 158
Stack Port Counters . . . . . . . . . . . . . . . . 159
Stack Port Diagnostics . . . . . . . . . . . . . . . 159
NSF Summary
. . . . . . . . . . . . . . . . . . . . 160
Checkpoint Statistics . . . . . . . . . . . . . . . . 161
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 162
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 162
Viewing and Clearing Stacking and NSF
Information
Stacking and NSF Usage Scenarios
Basic Failover
Preconfiguring a Stack Member
. . . . . . . . . . . . . . . . . . . . . 164
. . . . . . . . . . . 164
. . . . . . . . . . . . . . . . . . . . 166
. . . . . . . . . . 168
NSF in the Data Center . . . . . . . . . . . . . . . 170
NSF and VoIP . . . . . . . . . . . . . . . . . . . . 171
NSF and DHCP Snooping
. . . . . . . . . . . . . . 172
NSF and the Storage Access Network . . . . . . . 173
NSF and Routed Access
. . . . . . . . . . . . . . 175
10 Configuring Authentication,
Authorization, and Accounting . . . . . . . 177
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 177
Methods
Access Lines
. . . . . . . . . . . . . . . . . . . . . . 178
. . . . . . . . . . . . . . . . . . . . 179
Contents 11
Authentication . . . . . . . . . . . . . . . . . . . . . 179
Authorization
Exec Authorization Capabilities
. . . . . . . . . . . . . . . . . . . . . . 180
. . . . . . . . . . 181
Accounting . . . . . . . . . . . . . . . . . . . . . . . 182
Authentication Examples . . . . . . . . . . . . . . . 183
Local Authentication Example
. . . . . . . . . . 183
TACACS+ Authentication Example . . . . . . . . 184
RADIUS Authentication Example . . . . . . . . . 186
Authorization Examples . . . . . . . . . . . . . . . . 187
Local Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 187
TACACS+ Authorization Example—Direct
Login to Privileged EXEC Mode
. . . . . . . . . . 187
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 188
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 189
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 190
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 191
RADIUS Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 191
12 Contents
Using RADIUS Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . 192
Access
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 192
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 194
How Are RADIUS Attributes Processed on
the Switch?
. . . . . . . . . . . . . . . . . . . . 196
Using TACACS+ Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . . 197
Access
Which TACACS+ Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 198
Default Configurations. . . . . . . . . . . . . . . . . . 199
Method Lists
. . . . . . . . . . . . . . . . . . . . 199
Access Lines (AAA) . . . . . . . . . . . . . . . . 199
Access Lines (Non-AAA)
. . . . . . . . . . . . . . 200
Administrative Profiles . . . . . . . . . . . . . . . 200
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 203
System Monitoring Overview . . . . . . . . . . . . . . 203
What System Information Is Monitored?
Why Is System Information Needed? . . . . . . . 204
Where Are Log Messages Sent?
What Are the Severity Levels? . . . . . . . . . . . 205
What Are the System Startup and Operation
. . . . . . . . . . . . . . . . . . . . . . . . 205
Logs?
What Is the Log Message Format? . . . . . . . . . 206
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 207
. . . . . . 203
. . . . . . . . . . 204
Default Log Settings . . . . . . . . . . . . . . . . . . . 207
Monitoring System Information and Configuring
Logging (Web)
Device Information
. . . . . . . . . . . . . . . . . . . . . . 208
. . . . . . . . . . . . . . . . . 208
System Health . . . . . . . . . . . . . . . . . . . 209
System Resources . . . . . . . . . . . . . . . . . 210
Integrated Cable Test for Copper Cables
. . . . . . 211
Optical Transceiver Diagnostics . . . . . . . . . . 212
Log Global Settings . . . . . . . . . . . . . . . . . 214
Contents 13
RAM Log . . . . . . . . . . . . . . . . . . . . . 215
Log File . . . . . . . . . . . . . . . . . . . . . . 216
Remote Log Server . . . . . . . . . . . . . . . . 216
Email Alert Global Configuration . . . . . . . . . 219
Email Alert Mail Server Configuration . . . . . . 220
Email Alert Subject Configuration
Email Alert To Address Configuration
Email Alert Statistics
. . . . . . . . . . . . . . . 224
. . . . . . . . 222
. . . . . . . 223
Monitoring System Information and Configuring
Logging (CLI)
Viewing System Information
. . . . . . . . . . . . . . . . . . . . . . 225
. . . . . . . . . . . 225
Running Cable Diagnostics . . . . . . . . . . . . 225
Configuring Local Logging . . . . . . . . . . . . 226
Configuring Remote Logging
Configuring Mail Server Settings
. . . . . . . . . . . 228
. . . . . . . . . 229
Configuring Email Alerts for Log Messages . . . 230
Logging Configuration Examples . . . . . . . . . . . 232
Configuring Local and Remote Logging
. . . . . 232
Configuring Email Alerting . . . . . . . . . . . . 233
12 Managing General System Settings . . . 237
14 Contents
System Settings Overview. . . . . . . . . . . . . . . 237
Why Does System Information Need to
Be Configured?
. . . . . . . . . . . . . . . . . . 238
What Are SDM Templates? . . . . . . . . . . . . 239
Why is the System Time Needed?
. . . . . . . . 240
How Does SNTP Work?. . . . . . . . . . . . . . 240
Default General System Information . . . . . . . . . 240
Configuring General System Settings (Web)
System Information
. . . . . . . . . . . . . . . . 241
. . . . . 241
CLI Banner . . . . . . . . . . . . . . . . . . . . . 244
SDM Template Preference
. . . . . . . . . . . . . 245
Clock . . . . . . . . . . . . . . . . . . . . . . . . 246
SNTP Global Settings . . . . . . . . . . . . . . . . 247
SNTP Authentication
. . . . . . . . . . . . . . . . 248
SNTP Server . . . . . . . . . . . . . . . . . . . . 250
Summer Time Configuration . . . . . . . . . . . . 254
Time Zone Configuration . . . . . . . . . . . . . . 255
Slot Summary . . . . . . . . . . . . . . . . . . . . 256
Supported Cards . . . . . . . . . . . . . . . . . . 257
Configuring System Settings (CLI) . . . . . . . . . . . . 258
Configuring System Information
. . . . . . . . . . 258
Configuring the Banner. . . . . . . . . . . . . . . 259
Managing the SDM Template . . . . . . . . . . . 260
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . . 260
Setting the System Time and Date Manually. . . . 262
Viewing Slot Information . . . . . . . . . . . . . . 263
General System Settings Configuration Examples
Configuring System and Banner Information
Configuring SNTP
Configuring the Time Manually
. . . . . . . . . . . . . . . . . . 267
. . . . . . . . . . . 269
. . . 264
. . . 264
13 Configuring SNMP . . . . . . . . . . . . . . . . . 271
SNMP Overview . . . . . . . . . . . . . . . . . . . . . 271
What Is SNMP?
What Are SNMP Traps? . . . . . . . . . . . . . . 272
Why Is SNMP Needed?
. . . . . . . . . . . . . . . . . . . 271
. . . . . . . . . . . . . . 273
Contents 15
Default SNMP Values . . . . . . . . . . . . . . . . . 273
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings
Access Control Group
. . . . . . . . . . . . . . . 275
. . . . . . . . . . . . 275
. . . . . . . . . . . . . . . 276
. . . . . . . . . . . . . . 278
SNMPv3 User Security Model (USM) . . . . . . 280
Communities . . . . . . . . . . . . . . . . . . . 283
Notification Filter
. . . . . . . . . . . . . . . . . 285
Notification Recipients . . . . . . . . . . . . . . 286
Trap Flags . . . . . . . . . . . . . . . . . . . . . 289
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . 290
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . 291
Trap Log . . . . . . . . . . . . . . . . . . . . . . 292
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 293
Configuring the SNMPv3 Engine ID
. . . . . . . . 293
Configuring SNMP Views, Groups, and
Users
. . . . . . . . . . . . . . . . . . . . . . . 294
Configuring Communities . . . . . . . . . . . . . 297
Configuring SNMP Notifications (Traps
and Informs)
SNMP Configuration Examples
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . . . . . . 299
. . . . . . . . . . . . 302
. . . . . . . . 302
. . . . . . . . . . . . . . . 303
14 Managing Images and Files. . . . . . . . . . 307
16 Contents
Image and File Management Overview . . . . . . . . 307
What Files Can Be Managed?
Why Is File Management Needed?
. . . . . . . . . . 307
. . . . . . . . 309
What Methods Are Supported for File
Management?
. . . . . . . . . . . . . . . . . . . 311
What Factors Should Be Considered When
Managing Files?
. . . . . . . . . . . . . . . . . . 311
How Is the Running Configuration Saved?. . . . . 313
Managing Images and Files (Web) . . . . . . . . . . . 314
File System
. . . . . . . . . . . . . . . . . . . . . 314
Active Images . . . . . . . . . . . . . . . . . . . 315
USB Flash Drive. . . . . . . . . . . . . . . . . . . 316
File Download. . . . . . . . . . . . . . . . . . . . 317
File Upload
. . . . . . . . . . . . . . . . . . . . . 319
Copy Files . . . . . . . . . . . . . . . . . . . . . . 321
Managing Images and Files (CLI) . . . . . . . . . . . . 322
Downloading and Activating a New
Image (TFTP)
. . . . . . . . . . . . . . . . . . . . 322
Managing Files in Internal Flash . . . . . . . . . . 323
Managing Files on a USB Flash Device
(PowerConnect 8100-series switches only)
. . . . 324
Uploading a Configuration File (SCP) . . . . . . . . 324
Managing Configuration Scripts (SFTP) . . . . . . 325
File and Image Management Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 326
Upgrading the Firmware
Managing Configuration Scripts
. . . . . . . . . . . . . . 326
. . . . . . . . . . 329
Managing Files by Using the USB Flash Drive
(PowerConnect 8100-series switches only)
. . . . 331
15 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 333
Auto Configuration Overview . . . . . . . . . . . . . . 333
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . 334
Use?
. . . . . . . . . 334
Contents 17
What Is the DHCP Auto Configuration
Process?
. . . . . . . . . . . . . . . . . . . . . 335
Monitoring and Completing the DHCP
Auto Configuration Process
. . . . . . . . . . . 339
What Are the Dependencies for DHCP
Auto Configuration?
. . . . . . . . . . . . . . . . 340
Default Auto Configuration Values . . . . . . . . . . 341
Managing Auto Configuration (Web) . . . . . . . . . 342
Auto-Install Configuration
. . . . . . . . . . . . 342
Managing Auto Configuration (CLI)
Managing Auto Configuration
. . . . . . . . . . 343
. . . . . . . . . . 343
Auto Configuration Example . . . . . . . . . . . . . . 344
Enabling DHCP Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . 344
16 Monitoring Switch Traffic . . . . . . . . . . . 347
Traffic Monitoring Overview. . . . . . . . . . . . . . 347
What is sFlow Technology?
What is RMON?. . . . . . . . . . . . . . . . . . 350
What is Port Mirroring?
Why is Traffic Monitoring Needed? . . . . . . . 352
Default Traffic Monitoring Values . . . . . . . . . . . 352
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration
sFlow Sampler Configuration
sFlow Poll Configuration . . . . . . . . . . . . . 356
Interface Statistics . . . . . . . . . . . . . . . . 357
Etherlike Statistics
. . . . . . . . . . . . 347
. . . . . . . . . . . . . . 351
. . . . . . . . . . . 353
. . . . . . . . . . . . . . 353
. . . . . . . . . . 354
. . . . . . . . . . . 355
. . . . . . . . . . . . . . . . 358
18 Contents
GVRP Statistics . . . . . . . . . . . . . . . . . . . 359
EAP Statistics
. . . . . . . . . . . . . . . . . . . . 360
Utilization Summary . . . . . . . . . . . . . . . . 361
Counter Summary. . . . . . . . . . . . . . . . . . 362
Switchport Statistics
. . . . . . . . . . . . . . . . 363
RMON Statistics . . . . . . . . . . . . . . . . . . 364
RMON History Control Statistics . . . . . . . . . . 365
RMON History Table . . . . . . . . . . . . . . . . 367
RMON Event Control . . . . . . . . . . . . . . . . 368
RMON Event Log
. . . . . . . . . . . . . . . . . . 370
RMON Alarms . . . . . . . . . . . . . . . . . . . 371
Port Statistics. . . . . . . . . . . . . . . . . . . . 373
LAG Statistics
. . . . . . . . . . . . . . . . . . . . 374
Port Mirroring. . . . . . . . . . . . . . . . . . . . 375
Monitoring Switch Traffic (CLI) . . . . . . . . . . . . . 378
Configuring sFlow
. . . . . . . . . . . . . . . . . . 378
Configuring RMON . . . . . . . . . . . . . . . . . 380
Viewing Statistics. . . . . . . . . . . . . . . . . . 382
Configuring Port Mirroring
. . . . . . . . . . . . . 383
Traffic Monitoring Configuration Examples
Configuring sFlow
Configuring RMON
. . . . . . . . . . . . . . . . . . 384
. . . . . . . . . . . . . . . . . 386
. . . . . . . 384
17 Configuring iSCSI Optimization . . . . . . . 387
iSCSI Optimization Overview . . . . . . . . . . . . . . 387
What Does iSCSI Optimization Do?
How Does the Switch Detect iSCSI Traffic
. . . . . . . . . . . . . . . . . . . . . . . . 388
Flows?
How Is Quality of Service Applied to iSCSI
Traffic Flows?
. . . . . . . . . . . . . . . . . . . . 388
How Does iSCSI Optimization Use ACLs? . . . . . 389
. . . . . . . . . 388
Contents 19
What Information Does the Switch Track in
iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . 389
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 390
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 390
How Does iSCSI Optimization Interact with
. . . . . . . . . . . . . . . . . . . . . . . 391
DCBx?
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . 391
Default iSCSI Optimization Values. . . . . . . . . . . 392
Configuring iSCSI Optimization (Web)
iSCSI Global Configuration
iSCSI Targets Table
iSCSI Sessions Table
. . . . . . . . . . . . . . . . 394
. . . . . . . . . . . . . . . 395
. . . . . . . . . 393
. . . . . . . . . . . . 393
iSCSI Sessions Detailed . . . . . . . . . . . . . 396
Configuring iSCSI Optimization (CLI) . . . . . . . . . 397
iSCSI Optimization Configuration Examples
. . . . . 399
Configuring iSCSI Optimization Between
Servers and a Disk Array . . . . . . . . . . . . . 399
18 Configuring a Captive Portal . . . . . . . . . 401
Captive Portal Overview . . . . . . . . . . . . . . . . 401
What Does a Captive Portal Do?
Is the Captive Portal Feature Dependent on
Any Other Feature?
. . . . . . . . . . . . . . . . 402
What Factors Should Be Considered When
Designing and Configuring a Captive Portal?
How Does Captive Portal Work? . . . . . . . . . 404
What Captive Portal Pages Can Be
Customized?
. . . . . . . . . . . . . . . . . . . . 405
. . . . . . . . . 401
. . . 403
20 Contents
Default Captive Portal Behavior and Settings . . . . . 406
Configuring the Captive Portal (Web)
Captive Portal Global Configuration
Captive Portal Configuration
Local User
User Group
Interface Association
. . . . . . . . . . . . . . . . . . . . . 414
. . . . . . . . . . . . . . . . . . . . . 418
. . . . . . . . . . . . . . . . 420
. . . . . . . . . . 408
. . . . . . . . 408
. . . . . . . . . . . . 409
Captive Portal Global Status . . . . . . . . . . . . 421
Captive Portal Activation and Activity Status . . . 422
Interface Activation Status. . . . . . . . . . . . . 423
Interface Capability Status . . . . . . . . . . . . . 424
Client Summary . . . . . . . . . . . . . . . . . . . 425
Client Detail . . . . . . . . . . . . . . . . . . . . . 426
Captive Portal Interface Client Status
. . . . . . . 427
Captive Portal Client Status . . . . . . . . . . . . 428
Configuring a Captive Portal (CLI) . . . . . . . . . . . . 429
Configuring Global Captive Portal Settings
. . . . . 429
Creating and Configuring a Captive Portal . . . . . 430
Configuring Captive Portal Groups and Users . . . 433
Managing Captive Portal Clients . . . . . . . . . . 434
Captive Portal Configuration Example . . . . . . . . . 435
Configuration Overview
Detailed Configuration Procedures
. . . . . . . . . . . . . . . 436
. . . . . . . . 437
19 Configuring Port Characteristics . . . . . 439
Port Overview . . . . . . . . . . . . . . . . . . . . . . 439
What Physical Port Characteristics Can
Be Configured?
What is Link Dependency?
What Interface Types are Supported? . . . . . . . 442
What is Interface Configuration Mode? . . . . . . 442
. . . . . . . . . . . . . . . . . . . 439
. . . . . . . . . . . . . 440
Contents 21
Default Port Values. . . . . . . . . . . . . . . . . . . 444
Configuring Port Characteristics (Web)
Port Configuration
. . . . . . . . . . . . . . . . . 445
Link Dependency Configuration
. . . . . . . . 445
. . . . . . . . . 448
Link Dependency Summary . . . . . . . . . . . . 450
Configuring Port Characteristics (CLI). . . . . . . . . 451
Configuring Port Settings
. . . . . . . . . . . . . 451
Configuring Link Dependencies . . . . . . . . . 452
Port Configuration Examples . . . . . . . . . . . . . 454
Configuring Port Settings
. . . . . . . . . . . . . 454
Configuring a Link Dependency Groups . . . . . 455
20 Configuring Port and System
Security . . . . . . . . . . . . . . . . . . . . . . . . . 457
IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . 458
What is IEEE 802.1X?
What are the 802.1X Port States?. . . . . . . . . 459
What is MAC-Based 802.1X Authentication?
What is the Role of 802.1X in VLAN
Assignment?
What is Monitor Mode?
How Does the Authentication Server Assign
DiffServ Filters?
What is the Internal Authentication Server?
Default 802.1X Values . . . . . . . . . . . . . . . 466
Configuring IEEE 802.1X (Web) . . . . . . . . . . 467
Configuring IEEE 802.1X (CLI)
Configuring Internal Authentication Server
. . . . . . . . . . . . . . . . . . . . . . . 481
Users
IEEE 802.1X Configuration Examples . . . . . . . 481
. . . . . . . . . . . . . . . 458
. . . . . . . . . . . . . . . . . . . 461
. . . . . . . . . . . . . . 463
. . . . . . . . . . . . . . . . . . 465
. . . . . . . . . . . 476
. . . 460
. . . 465
22 Contents
Port Security (Port-MAC Locking). . . . . . . . . . . . 495
Default 802.1X Values
. . . . . . . . . . . . . . . . 495
Configuring Port Security (CLI) . . . . . . . . . . . 498
Denial of Service . . . . . . . . . . . . . . . . . . . . 499
21 Configuring Access Control Lists . . . . . 501
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 501
What Are MAC ACLs?
What Are IP ACLs?
What Is the ACL Redirect Function? . . . . . . . . 503
What Is the ACL Mirror Function? . . . . . . . . . 503
What Is ACL Logging
What Are Time-Based ACLs?. . . . . . . . . . . . 504
What Are the ACL Limitations?. . . . . . . . . . . 505
How Are ACLs Configured?
Preventing False ACL Matches. . . . . . . . . . . 506
Configuring ACLs (Web) . . . . . . . . . . . . . . . . . 508
IP ACL Configuration
IP ACL Rule Configuration . . . . . . . . . . . . . 510
MAC ACL Configuration . . . . . . . . . . . . . . 512
MAC ACL Rule Configuration
IPv6 ACL Configuration
IPv6 ACL Rule Configuration
ACL Binding Configuration
Time Range Entry Configuration
. . . . . . . . . . . . . . . 502
. . . . . . . . . . . . . . . . . 503
. . . . . . . . . . . . . . . . 504
. . . . . . . . . . . . . 506
. . . . . . . . . . . . . . . . 508
. . . . . . . . . . . . 514
. . . . . . . . . . . . . . . 515
. . . . . . . . . . . . 516
. . . . . . . . . . . . . 518
. . . . . . . . . . 519
Configuring ACLs (CLI) . . . . . . . . . . . . . . . . . . 521
Configuring an IPv4 ACL
. . . . . . . . . . . . . . 521
Configuring a MAC ACL. . . . . . . . . . . . . . . 523
Configuring an IPv6 ACL . . . . . . . . . . . . . . 525
Configuring a Time Range
. . . . . . . . . . . . . 527
Contents 23
ACL Configuration Examples. . . . . . . . . . . . . . 529
Configuring an IP ACL
. . . . . . . . . . . . . . . 529
Configuring a MAC ACL . . . . . . . . . . . . . . 531
Configuring a Time-Based ACL . . . . . . . . . . 533
Configuring a Management Access List . . . . . 534
22 Configuring VLANs. . . . . . . . . . . . . . . . . 539
VLAN Overview . . . . . . . . . . . . . . . . . . . . 539
Switchport Modes
VLAN Tagging . . . . . . . . . . . . . . . . . . . 543
GVRP . . . . . . . . . . . . . . . . . . . . . . . 544
Double-VLAN Tagging
Voice VLAN . . . . . . . . . . . . . . . . . . . . 545
Private VLANs. . . . . . . . . . . . . . . . . . . 547
Additional VLAN Features
. . . . . . . . . . . . . . . . 542
. . . . . . . . . . . . . . 544
. . . . . . . . . . . . 553
24 Contents
Default VLAN Behavior
. . . . . . . . . . . . . . . . 554
Configuring VLANs (Web) . . . . . . . . . . . . . . . 556
VLAN Membership
. . . . . . . . . . . . . . . . 556
VLAN Port Settings . . . . . . . . . . . . . . . . 561
VLAN LAG Settings . . . . . . . . . . . . . . . . 562
Bind MAC to VLAN . . . . . . . . . . . . . . . . 564
Bind IP Subnet to VLAN. . . . . . . . . . . . . . 565
GVRP Parameters
Protocol Group
. . . . . . . . . . . . . . . . . 567
. . . . . . . . . . . . . . . . . . 569
Adding a Protocol Group . . . . . . . . . . . . . 570
Double VLAN Global Configuration
Double VLAN Interface Configuration
. . . . . . . . 572
. . . . . . 573
Voice VLAN . . . . . . . . . . . . . . . . . . . . 575
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . 576
Creating a VLAN
. . . . . . . . . . . . . . . . . 576
Configuring a Port in Access Mode . . . . . . . . 577
Configuring a Port in General Mode . . . . . . . . 578
Configuring a Port in Trunk Mode . . . . . . . . . 579
Configuring VLAN Settings for a LAG . . . . . . . 581
Configuring Double VLAN Tagging . . . . . . . . . 582
Configuring MAC-Based VLANs . . . . . . . . . . 583
Configuring IP-Based VLANs. . . . . . . . . . . . 584
Configuring a Protocol-Based VLAN
Configuring GVRP
. . . . . . . . . . . . . . . . . . 586
. . . . . . . . 584
Configuring Voice VLANs. . . . . . . . . . . . . . 588
VLAN Configuration Examples . . . . . . . . . . . . . 589
Configuring VLANs Using Dell OpenManage
Administrator
. . . . . . . . . . . . . . . . . . . . 592
Configure the VLANs and Ports on Switch 2 . . . . 596
Configuring VLANs Using the CLI. . . . . . . . . . 597
Configuring a Voice VLAN . . . . . . . . . . . . . 601
23 Configuring the Spanning Tree
Protocol . . . . . . . . . . . . . . . . . . . . . . . . 605
STP Overview . . . . . . . . . . . . . . . . . . . . . . 605
What Are Classic STP, Multiple STP, and
Rapid STP? . . . . . . . . . . . . . . . . . . . . . 605
How Does STP Work? . . . . . . . . . . . . . . . 606
How Does MSTP Operate in the Network?
MSTP with Multiple Forwarding Paths
What are the Optional STP Features? . . . . . . . 612
. . . . . . . 611
. . . . 607
Default STP Values
. . . . . . . . . . . . . . . . . . . 615
Configuring Spanning Tree (Web) . . . . . . . . . . . . 616
STP Global Settings
. . . . . . . . . . . . . . . . . 616
STP Port Settings. . . . . . . . . . . . . . . . . . 618
STP LAG Settings. . . . . . . . . . . . . . . . . . 620
Contents 25
Rapid Spanning Tree . . . . . . . . . . . . . . . 621
MSTP Settings . . . . . . . . . . . . . . . . . . 624
MSTP Interface Settings . . . . . . . . . . . . . 626
Configuring Spanning Tree (CLI)
Configuring Global STP Bridge Settings
Configuring Optional STP Features
. . . . . . . . . . . . 628
. . . . . 628
. . . . . . . . 629
Configuring STP Interface Settings. . . . . . . . 630
Configuring MSTP Switch Settings . . . . . . . . 631
Configuring MSTP Interface Settings . . . . . . 632
STP Configuration Examples. . . . . . . . . . . . . . 633
Configuring STP
. . . . . . . . . . . . . . . . . . 633
Configuring MSTP. . . . . . . . . . . . . . . . . 635
24 Discovering Network Devices . . . . . . . . 637
Device Discovery Overview . . . . . . . . . . . . . . 637
What Is ISDP?
What is LLDP?. . . . . . . . . . . . . . . . . . . 637
What is LLDP-MED? . . . . . . . . . . . . . . . 638
Why are Device Discovery Protocols
Needed?
Default IDSP and LLDP Values. . . . . . . . . . . . . 639
. . . . . . . . . . . . . . . . . . . 637
. . . . . . . . . . . . . . . . . . . . . . 638
26 Contents
Configuring ISDP and LLDP (Web)
ISDP Global Configuration
ISDP Cache Table
. . . . . . . . . . . . . . . . . 642
. . . . . . . . . . . 641
. . . . . . . . . . . . 641
ISDP Interface Configuration . . . . . . . . . . . 643
ISDP Statistics . . . . . . . . . . . . . . . . . . 645
LLDP Configuration
. . . . . . . . . . . . . . . . 646
LLDP Statistics . . . . . . . . . . . . . . . . . . 648
LLDP Connections. . . . . . . . . . . . . . . . . 649
LLDP-MED Global Configuration
. . . . . . . . . 651
LLDP-MED Interface Configuration . . . . . . . . 652
LLDP-MED Local Device Information
. . . . . . . 654
LLDP-MED Remote Device Information . . . . . . 655
Configuring ISDP and LLDP (CLI) . . . . . . . . . . . . 656
Configuring Global ISDP Settings
. . . . . . . . . 656
Enabling ISDP on a Port . . . . . . . . . . . . . . 657
Viewing and Clearing ISDP Information . . . . . . 657
Configuring Global LLDP Settings . . . . . . . . . 658
Configuring Port-based LLDP Settings . . . . . . . 658
Viewing and Clearing LLDP Information . . . . . . 659
Configuring LLDP-MED Settings . . . . . . . . . . 660
Viewing LLDP-MED Information . . . . . . . . . . 661
Device Discovery Configuration Examples . . . . . . . 661
Configuring ISDP
. . . . . . . . . . . . . . . . . . 661
Configuring LLDP . . . . . . . . . . . . . . . . . . 662
25 Configuring Port-Based Traffic
Control . . . . . . . . . . . . . . . . . . . . . . . . . 665
Port-Based Traffic Control Overview . . . . . . . . . . 665
What is Flow Control?
What is Storm Control?. . . . . . . . . . . . . . . 666
What are Protected Ports?
What is Link Local Protocol Filtering? . . . . . . . 667
. . . . . . . . . . . . . . . 666
. . . . . . . . . . . . . 667
Default Port-Based Traffic Control Values . . . . . . . 668
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
Storm Control
Protected Port Configuration
. . . . . . . . . . . . . . . . . . . . 670
. . . . . . . . . . . . 672
. . . . . 669
. . . . . . . 669
LLPF Configuration . . . . . . . . . . . . . . . . . 674
Contents 27
Configuring Port-Based Traffic Control (CLI) . . . . . 676
Configuring Flow Control and Storm Control
. . . 676
Configuring Protected Ports . . . . . . . . . . . 677
Configuring LLPF . . . . . . . . . . . . . . . . . 678
Port-Based Traffic Control Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 679
26 Configuring L2 Multicast Features . . . . 681
L2 Multicast Overview . . . . . . . . . . . . . . . . . 681
What Are the Multicast Bridging Features?
L2 Multicast Forwarding Modes . . . . . . . . . 682
What Is IP Multicast Traffic?
. . . . . . . . . . . 682
What Is IGMP Snooping? . . . . . . . . . . . . . 683
What Is MLD Snooping? . . . . . . . . . . . . . 683
What Is Multicast VLAN Registration?
When Are L3 Multicast Features Required? . . . 685
What Are GARP and GMRP? . . . . . . . . . . . 686
Snooping Switch Restrictions. . . . . . . . . . . . . 687
Partial IGMPv3 and MLDv2 Support
MAC Address-Based Multicast Group . . . . . . 687
IGMP Snooping in a Multicast Router
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier
. . . 681
. . . . . . 684
. . . . . . . 687
. . . . . . 687
. . . . . . 687
28 Contents
Current MLD Snooping Functional Limitations
Summary
. . . . . . . . . . . . . . . . . . . . . . . . 688
Default L2 Multicast Values . . . . . . . . . . . . . . 689
Configuring L2 Multicast Features (Web) . . . . . . . 691
Multicast Global Parameters
. . . . . . . . . . . 691
Bridge Multicast Group . . . . . . . . . . . . . . 692
Bridge Multicast Forwarding . . . . . . . . . . . . 695
MRouter Status. . . . . . . . . . . . . . . . . . . 696
General IGMP Snooping . . . . . . . . . . . . . . 697
Global Querier Configuration . . . . . . . . . . . . 700
VLAN Querier . . . . . . . . . . . . . . . . . . . . 701
VLAN Querier Status
. . . . . . . . . . . . . . . . 704
MFDB IGMP Snooping Table . . . . . . . . . . . . 705
MLD Snooping General. . . . . . . . . . . . . . . 706
MLD Snooping Global Querier Configuration
MLD Snooping VLAN Querier
. . . . . . . . . . . 709
. . . 708
MLD Snooping VLAN Querier Status . . . . . . . . 712
MFDB MLD Snooping Table . . . . . . . . . . . . 713
MVR Global Configuration
. . . . . . . . . . . . . 714
MVR Members . . . . . . . . . . . . . . . . . . . 715
MVR Interface Configuration . . . . . . . . . . . . 716
MVR Statistics . . . . . . . . . . . . . . . . . . . 719
GARP Timers . . . . . . . . . . . . . . . . . . . . 720
GMRP Parameters
MFDB GMRP Table
. . . . . . . . . . . . . . . . . 722
. . . . . . . . . . . . . . . . . 724
Configuring L2 Multicast Features (CLI)
Configuring Bridge Multicasting
Configuring IGMP Snooping
. . . . . . . . . 725
. . . . . . . . . . 725
. . . . . . . . . . . . 727
Configuring IGMP Snooping on VLANs . . . . . . 728
Configuring IGMP Snooping Querier . . . . . . . . 729
Configuring MLD Snooping
. . . . . . . . . . . . . 730
Configuring MLD Snooping on VLANs . . . . . . . 731
Configuring MLD Snooping Querier . . . . . . . . 732
Configuring MVR
. . . . . . . . . . . . . . . . . . 733
Configuring GARP Timers and GMRP . . . . . . . 735
Case Study on a Real-World Network Topology . . . . 736
Multicast Snooping Case Study
. . . . . . . . . . 736
Contents 29
27 Snooping and Inspecting Traffic . . . . . . 743
Traffic Snooping and Inspection Overview . . . . . . 743
What Is DHCP Snooping?
How Is the DHCP Snooping Bindings Database
Populated?
. . . . . . . . . . . . . . . . . . . . 745
What Is IP Source Guard? . . . . . . . . . . . . 747
What is Dynamic ARP Inspection? . . . . . . . . 748
Why Is Traffic Snooping and Inspection
Necessary?
. . . . . . . . . . . . . . . . . . . . 749
Default Traffic Snooping and Inspection Values . . . 749
Configuring Traffic Snooping and Inspection
. . . . . . . . . . . . . . . . . . . . . . . . . . 751
(Web)
DHCP Snooping Configuration
DHCP Snooping Interface Configuration . . . . . 752
DHCP Snooping VLAN Configuration . . . . . . . 754
DHCP Snooping Persistent Configuration . . . . 756
DHCP Snooping Static Bindings
Configuration
. . . . . . . . . . . . . . . . . . . 757
DHCP Snooping Dynamic Bindings
Summary
. . . . . . . . . . . . . . . . . . . . . 759
DHCP Snooping Statistics
IPSG Interface Configuration . . . . . . . . . . . 761
IPSG Binding Configuration. . . . . . . . . . . . 762
IPSG Binding Summary
DAI Global Configuration . . . . . . . . . . . . . 764
DAI Interface Configuration . . . . . . . . . . . 765
DAI VLAN Configuration
DAI ACL Configuration . . . . . . . . . . . . . . 768
DAI ACL Rule Configuration. . . . . . . . . . . . 769
DAI Statistics
. . . . . . . . . . . . . . . . . . . 771
. . . . . . . . . . . . . 744
. . . . . . . . . . 751
. . . . . . . . . . . . 760
. . . . . . . . . . . . . . 763
. . . . . . . . . . . . . 767
30 Contents
Configuring Traffic Snooping and Inspection
(CLI)
. . . . . . . . . . . . . . . . . . . . . . . . . . 772
Configuring DHCP Snooping
. . . . . . . . . . . 772