Dell PowerConnect
M6220, M6348, M8024, and
M8024-k Switch
User’s Configuration
Guide
Regulatory Models: PCM6220, PCM6348,
PCM8024, and PCM8024-k
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in t his text: Dellâ„¢, the DELL l ogo, PowerEdgeâ„¢, EqualLogi câ„¢, PowerConnectâ„¢,
and OpenManageâ„¢ are trademarks of Dell Inc. Microsoft
®
, and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation
DOS
in the United States and/or other countries. sFlow
®
is a registered trademark of Cisco Systems. Mozilla® and Firefox® are registered trademarks
Cisco
of the Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
®
, Windows®, Windows Server®, MS-
®
is a registered trademark of InMon Corporation.
Regulatory Models: PCM6220, PCM6348, PCM8024, and PCM8024-k
January 2013 Rev. A05
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation
. . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options
Simple Mode . . . . . . . . . . . . . . . . . . . . 54
Port Aggregator
. . . . . . . . . . . . . . . . . . . 55
System Time Management . . . . . . . . . . . . . 55
Log Messages . . . . . . . . . . . . . . . . . . . 55
Integrated DHCP Server
Management of Basic Network Information
IPv6 Management Features
Dual Software Images . . . . . . . . . . . . . . . 56
File Management
. . . . . . . . . . . . . . . . . . 57
Switch Database Management Templates
Automatic Installation of Firmware and
Configuration
sFlow
. . . . . . . . . . . . . . . . . . . . 57
. . . . . . . . . . . . . . . . . . . . . . . . 58
SNMP Alarms and Trap Logs . . . . . . . . . . . . 58
CDP Interoperability through ISDP . . . . . . . . . 58
Remote Monitoring (RMON)
. . . . . . . . . . . 54
. . . . . . . . . . . . . . 56
. . . . 56
. . . . . . . . . . . . 56
. . . . . 57
. . . . . . . . . . . . 58
Contents 3
Stacking Features (PCM6220, PCM6348, and
PCM8024-k Only)
High Port Count
. . . . . . . . . . . . . . . . . . . . . 59
. . . . . . . . . . . . . . . . . . . 59
Single IP Management . . . . . . . . . . . . . . . 59
Automatic Firmware Update for New Stack
Members
. . . . . . . . . . . . . . . . . . . . . . 59
Stacking Compatibility with the PowerConnect
7000 Series
. . . . . . . . . . . . . . . . . . . . . 59
Master Failover with Transparent Transition . . . . 60
Nonstop Forwarding on the Stack . . . . . . . . . 60
Hot Add/Delete and Firmware
Synchronization
. . . . . . . . . . . . . . . . . . . 60
Security Features . . . . . . . . . . . . . . . . . . . . 60
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 60
Profiles
Password-Protected Management Access
. . . . 61
Strong Password Enforcement . . . . . . . . . . . 61
TACACS+ Client . . . . . . . . . . . . . . . . . . . 61
RADIUS Support
. . . . . . . . . . . . . . . . . . 61
SSH/SSL. . . . . . . . . . . . . . . . . . . . . . . 62
Inbound Telnet Control . . . . . . . . . . . . . . . 62
Denial of Service
. . . . . . . . . . . . . . . . . . 62
Port Protection . . . . . . . . . . . . . . . . . . . 62
Captive Portal . . . . . . . . . . . . . . . . . . . . 63
Dot1x Authentication (IEEE 802.1X)
. . . . . . . . . 63
MAC-Based 802.1X Authentication . . . . . . . . . 63
Dot1x Monitor Mode
MAC-Based Port Security
. . . . . . . . . . . . . . . . 64
. . . . . . . . . . . . . 64
Access Control Lists (ACL) . . . . . . . . . . . . . 64
Time-Based ACLs . . . . . . . . . . . . . . . . . . 65
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 65
DHCP Snooping . . . . . . . . . . . . . . . . . . . 65
Dynamic ARP Inspection . . . . . . . . . . . . . . 65
Protected Ports (Private VLAN Edge)
. . . . . . . . 66
4 Contents
Switching Features . . . . . . . . . . . . . . . . . . . 66
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 66
Head of Line Blocking Prevention . . . . . . . . . 66
Alternate Store and Forward (ASF). . . . . . . . . 66
Jumbo Frames Support
. . . . . . . . . . . . . . . 67
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 67
VLAN-Aware MAC-based Switching. . . . . . . . 67
Back Pressure Support
. . . . . . . . . . . . . . . 67
Auto Negotiation . . . . . . . . . . . . . . . . . . 68
Broadcast Storm Control . . . . . . . . . . . . . . 68
Port Mirroring
. . . . . . . . . . . . . . . . . . . . 68
Static and Dynamic MAC Address Tables . . . . . 69
Link Layer Discovery Protocol (LLDP) . . . . . . . 69
Link Layer Discovery Protocol (LLDP) for Media
Endpoint Devices
. . . . . . . . . . . . . . . . . . 69
Connectivity Fault Management
(IEEE 802.1ag)
. . . . . . . . . . . . . . . . . . . . 69
Priority-based Flow Control (PFC) . . . . . . . . . 70
Data Center Bridging Exchange (DBCx)
Protocol
. . . . . . . . . . . . . . . . . . . . . . . 70
Fibre Channel over Ethernet (FCoE) Initialization
Protocol Snooping
Cisco Protocol Filtering
. . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . 71
DHCP Layer 2 Relay. . . . . . . . . . . . . . . . . 71
Virtual Local Area Network Supported Features . . . . 71
VLAN Support
. . . . . . . . . . . . . . . . . . . . 71
Port-Based VLANs . . . . . . . . . . . . . . . . . 72
IP Subnet-based VLAN . . . . . . . . . . . . . . . 72
MAC-based VLAN
. . . . . . . . . . . . . . . . . 72
IEEE 802.1v Protocol-Based VLANs . . . . . . . . 72
GARP and GVRP Support . . . . . . . . . . . . . . 72
Voice VLAN
. . . . . . . . . . . . . . . . . . . . . 72
Guest VLAN. . . . . . . . . . . . . . . . . . . . . 73
Contents 5
Double VLANs. . . . . . . . . . . . . . . . . . . . 73
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Port Settings
. . . . . . . . . . . . 74
. . . . . . . . . . . 74
. . . . . . . . . . . . 74
Rapid Spanning Tree . . . . . . . . . . . . . . . . 74
Multiple Spanning Tree . . . . . . . . . . . . . . . 74
Bridge Protocol Data Unit (BPDU) Guard
BPDU Filtering
. . . . . . . . . . . . . . . . . . . 75
. . . . . . 75
Link Aggregation Features . . . . . . . . . . . . . . . . 75
Link Aggregation
. . . . . . . . . . . . . . . . . . 75
Link Aggregate Control Protocol (LACP) . . . . . . 75
Routing Features . . . . . . . . . . . . . . . . . . . . . 77
Address Resolution Protocol (ARP) Table
Management
VLAN Routing
. . . . . . . . . . . . . . . . . . . . 77
. . . . . . . . . . . . . . . . . . . . 77
IP Configuration . . . . . . . . . . . . . . . . . . . 77
Open Shortest Path First (OSPF) . . . . . . . . . . 77
BOOTP/DHCP Relay Agent
IP Helper and UDP Relay
Routing Information Protocol
. . . . . . . . . . . . . 78
. . . . . . . . . . . . . . 78
. . . . . . . . . . . . 78
Router Discovery . . . . . . . . . . . . . . . . . . 78
Routing Table . . . . . . . . . . . . . . . . . . . . 78
Virtual Router Redundancy Protocol (VRRP)
. . . . 79
Tunnel and Loopback Interfaces . . . . . . . . . . 79
6 Contents
IPv6 Routing Features . . . . . . . . . . . . . . . . . . 79
IPv6 Configuration
. . . . . . . . . . . . . . . . . 79
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 80
OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . 80
. . . . . . . . . . . . . . . . . . . . . . . 80
DHCPv6
Quality of Service (QoS) Features . . . . . . . . . . . . 81
Differentiated Services (DiffServ)
. . . . . . . . . 81
Class Of Service (CoS) . . . . . . . . . . . . . . . 81
Auto Voice over IP (VoIP) . . . . . . . . . . . . . . 81
Internet Small Computer System Interface
(iSCSI) Optimization
. . . . . . . . . . . . . . . . . 82
Layer 2 Multicast Features . . . . . . . . . . . . . . . 82
MAC Multicast Support
. . . . . . . . . . . . . . . 82
IGMP Snooping . . . . . . . . . . . . . . . . . . . 82
IGMP Snooping Querier . . . . . . . . . . . . . . 83
MLD Snooping
. . . . . . . . . . . . . . . . . . . 83
Multicast VLAN Registration . . . . . . . . . . . . 83
Layer 3 Multicast Features . . . . . . . . . . . . . . . 84
Distance Vector Multicast Routing Protocol
. . . . 84
Internet Group Management Protocol . . . . . . . 84
IGMP Proxy . . . . . . . . . . . . . . . . . . . . . 84
Protocol Independent Multicast—Dense
. . . . . . . . . . . . . . . . . . . . . . . . 84
Mode
Protocol Independent Multicast—Sparse
Mode
. . . . . . . . . . . . . . . . . . . . . . . . 85
Protocol Independent Multicast—Source
Specific Multicast
Protocol Independent Multicast IPv6 Support
. . . . . . . . . . . . . . . . . 85
. . . 85
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . . 85
3 Hardware Overview. . . . . . . . . . . . . . . . . 87
PowerConnect M6220, M6348, M8024, and M8024-k
Front Panel
. . . . . . . . . . . . . . . . . . . . . . . . 87
PowerConnect M6220 Front Panel
. . . . . . . . . 87
PowerConnect M6348 Front Panel . . . . . . . . . 89
PowerConnect M8024 Front Panel . . . . . . . . . 90
PowerConnect M8024-k Front Panel . . . . . . . . 91
Contents 7
Console (RS-232) Port . . . . . . . . . . . . . . . . . . 91
Console Redirect
. . . . . . . . . . . . . . . . . . 92
Out-of-Band Management Port
. . . . . . . . . . . . . 92
LED Definitions. . . . . . . . . . . . . . . . . . . . . . 93
Port LEDs
. . . . . . . . . . . . . . . . . . . . . . 93
System LEDs . . . . . . . . . . . . . . . . . . . . 96
Switch Addresses . . . . . . . . . . . . . . . . . . . . 97
4 Using Dell OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 101
About Dell OpenManage Switch Administrator. . . . 101
Starting the Application . . . . . . . . . . . . . . . . 102
Understanding the Interface
. . . . . . . . . . . . . . 103
Defining Fields . . . . . . . . . . . . . . . . . . . . . 105
Understanding the Device View . . . . . . . . . . . . 106
Using the Device View Port Features
. . . . . . . 106
5 Using the Command-Line Interface . . . . 107
8 Contents
Accessing the Switch Through the CLI . . . . . . . . 107
Console Connection
Telnet Connection
Understanding Command Modes
. . . . . . . . . . . . . . . . 107
. . . . . . . . . . . . . . . . . 108
. . . . . . . . . . . 109
Entering CLI Commands . . . . . . . . . . . . . . . . 111
Using the Question Mark to Get Help
. . . . . . . 111
Using Command Completion . . . . . . . . . . . 112
Entering Abbreviated Commands . . . . . . . . . 112
Negating Commands . . . . . . . . . . . . . . . . 112
Understanding Error Messages . . . . . . . . . . 113
Recalling Commands from the History Buffer
. . . 113
Specifying Physical Ports . . . . . . . . . . . . . 114
6 Default Settings. . . . . . . . . . . . . . . . . . . 117
7 Setting the IP Address and Other
Basic Network Information . . . . . . . . . . 123
IP Address and Network Information Overview . . . . 123
What Is the Basic Network Information?
Why Is Basic Network Information Needed? . . . 124
How Is Basic Network Information
Configured?
. . . . . . . . . . . . . . . . . . . . . 125
What Is Out-of-Band Management and In-Band
Management?
. . . . . . . . . . . . . . . . . . . 125
. . . . . 123
Default Network Information
. . . . . . . . . . . . . . 127
Configuring Basic Network Information (Web) . . . . . 128
Out-of-Band Interface
. . . . . . . . . . . . . . . 128
IP Interface Configuration (Default VLAN
IP Address)
. . . . . . . . . . . . . . . . . . . . . 129
Route Entry Configuration (Switch Default
Gateway)
Domain Name Server
Default Domain Name
. . . . . . . . . . . . . . . . . . . . . . 130
. . . . . . . . . . . . . . . . 132
. . . . . . . . . . . . . . . 133
Host Name Mapping . . . . . . . . . . . . . . . . 134
Dynamic Host Name Mapping . . . . . . . . . . . 135
Configuring Basic Network Information (CLI)
Enabling the DHCP Client on the OOB Port
. . . . . . 136
. . . . . 136
Contents 9
Enabling the DHCP Client on the Default
. . . . . . . . . . . . . . . . . . . . . . . 136
VLAN
Managing DHCP Leases . . . . . . . . . . . . . 137
Configuring Static Network Information on the
OOB Port
. . . . . . . . . . . . . . . . . . . . . 138
Configuring Static Network Information on the
Default VLAN
. . . . . . . . . . . . . . . . . . . 138
Configuring and Viewing Additional Network
Information
. . . . . . . . . . . . . . . . . . . . 139
Basic Network Information Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 140
8 Managing a Switch Stack . . . . . . . . . . . 143
Stacking Overview . . . . . . . . . . . . . . . . . . . 143
Creating a PowerConnect M6220 Stack
Creating a PowerConnect M6348 Stack
Creating a PowerConnect M8024-k Stack . . . . 147
PowerConnect 7000 Series and M6348
Stacking Compatibility
. . . . . . . . . . . . . . 149
How is the Stack Master Selected? . . . . . . . 150
Adding a Switch to the Stack. . . . . . . . . . . 151
Removing a Switch from the Stack
How is the Firmware Updated on the Stack? . . . 152
What is Stacking Standby?
What is Nonstop Forwarding?
. . . . . . . . . . . . 153
. . . . . . . . . . 153
Switch Stack MAC Addressing and Stack
Design Considerations
. . . . . . . . . . . . . . 156
NSF Network Design Considerations
Why is Stacking Needed? . . . . . . . . . . . . 157
. . . . . 145
. . . . . 146
. . . . . . . . 152
. . . . . . . 156
10 Contents
Default Stacking Values . . . . . . . . . . . . . . . . 157
Managing and Monitoring the Stack (Web)
Unit Configuration
. . . . . . . . . . . . . . . . . 158
. . . . . . 158
Stack Summary . . . . . . . . . . . . . . . . . . . 160
Stack Firmware Synchronization . . . . . . . . . . 161
Supported Switches . . . . . . . . . . . . . . . . 162
Stack Port Summary
. . . . . . . . . . . . . . . . 163
Stack Port Counters . . . . . . . . . . . . . . . . 164
Stack Port Diagnostics . . . . . . . . . . . . . . . 164
NSF Summary
. . . . . . . . . . . . . . . . . . . . 165
Checkpoint Statistics . . . . . . . . . . . . . . . . 166
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 167
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 167
Viewing and Clearing Stacking and NSF
Information
. . . . . . . . . . . . . . . . . . . . . 169
Stacking and NSF Usage Scenarios
Basic Failover
. . . . . . . . . . . . . . . . . . . . 170
Preconfiguring a Stack Member
. . . . . . . . . . . 169
. . . . . . . . . . 172
NSF in the Data Center . . . . . . . . . . . . . . . 174
NSF and VoIP . . . . . . . . . . . . . . . . . . . . 175
NSF and DHCP Snooping
. . . . . . . . . . . . . . 176
NSF and the Storage Access Network . . . . . . . 177
NSF and Routed Access . . . . . . . . . . . . . . 179
9 Configuring Authentication,
Authorization, and Accounting . . . . . . . 181
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 181
Methods
Access Lines
Authentication
Authorization. . . . . . . . . . . . . . . . . . . . . . . 184
Exec Authorization Capabilities
. . . . . . . . . . . . . . . . . . . . . . 182
. . . . . . . . . . . . . . . . . . . . 183
. . . . . . . . . . . . . . . . . . . . . . 183
. . . . . . . . . . 185
Contents 11
Accounting . . . . . . . . . . . . . . . . . . . . . . . 186
Authentication Examples
Local Authentication Example
TACACS+ Authentication Example
. . . . . . . . . . . . . . . 187
. . . . . . . . . . 187
. . . . . . . . 188
RADIUS Authentication Example . . . . . . . . . 190
Authorization Examples . . . . . . . . . . . . . . . . 191
Local Authorization Example—Direct Login to
Privileged EXEC Mode
. . . . . . . . . . . . . . 191
TACACS+ Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 191
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 192
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 193
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 194
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 195
RADIUS Authorization Example—Administrative
. . . . . . . . . . . . . . . . . . . . . . 195
Profiles
Using RADIUS Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . 196
Access
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 196
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 198
How Are RADIUS Attributes Processed on the
Switch?
. . . . . . . . . . . . . . . . . . . . . . 200
12 Contents
Using TACACS+ Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 201
Which TACACS+ Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 202
Default Configurations. . . . . . . . . . . . . . . . . . 203
Method Lists
. . . . . . . . . . . . . . . . . . . . 203
Access Lines (AAA) . . . . . . . . . . . . . . . . 203
Access Lines (Non-AAA) . . . . . . . . . . . . . . 204
Administrative Profiles
. . . . . . . . . . . . . . . 204
10 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 207
System Monitoring Overview . . . . . . . . . . . . . . 207
What System Information Is Monitored?
Why Is System Information Needed? . . . . . . . 208
Where Are Log Messages Sent? . . . . . . . . . . 208
What Are the Severity Levels?
. . . . . . . . . . . 209
What Are the System Startup and Operation
Logs?
. . . . . . . . . . . . . . . . . . . . . . . . 209
What Is the Log Message Format? . . . . . . . . . 210
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 211
. . . . . . 207
Default Log Settings
. . . . . . . . . . . . . . . . . . . 211
Monitoring System Information and Configuring
Logging (Web)
Device Information
System Health
System Resources
Integrated Cable Test for Copper Cables
. . . . . . . . . . . . . . . . . . . . . . 213
. . . . . . . . . . . . . . . . . 213
. . . . . . . . . . . . . . . . . . . 215
. . . . . . . . . . . . . . . . . 216
. . . . . . 217
Optical Transceiver Diagnostics . . . . . . . . . . 218
Log Global Settings . . . . . . . . . . . . . . . . . 220
RAM Log . . . . . . . . . . . . . . . . . . . . . . 221
. . . . . . . . . . . . . . . . . . . . . . . 222
Log File
Remote Log Server
Email Alert Global Configuration
. . . . . . . . . . . . . . . . . 222
. . . . . . . . . . 225
Email Alert Mail Server Configuration . . . . . . . 226
Contents 13
Email Alert Subject Configuration . . . . . . . . 228
Email Alert To Address Configuration
Email Alert Statistics
. . . . . . . . . . . . . . . 230
. . . . . . . 229
Monitoring System Information and Configuring
Logging (CLI)
Viewing System Information
. . . . . . . . . . . . . . . . . . . . . . 231
. . . . . . . . . . . 231
Running Cable Diagnostics . . . . . . . . . . . . 231
Configuring Local Logging . . . . . . . . . . . . 232
Configuring Remote Logging
Configuring Mail Server Settings
. . . . . . . . . . . 234
. . . . . . . . . 235
Configuring Email Alerts for Log Messages . . . 236
Logging Configuration Examples . . . . . . . . . . . 238
Configuring Local and Remote Logging
. . . . . 238
Configuring Email Alerting . . . . . . . . . . . . 239
11 Managing General System Settings . . . 243
System Settings Overview. . . . . . . . . . . . . . . 243
Why Does System Information Need to Be
Configured?
What is Simple Mode? . . . . . . . . . . . . . . 245
What is the Port Aggregator Feature?
What Is the LAG Dependency Feature in Port
Aggregator Mode?
What Are SDM Templates?
Why is the System Time Needed? . . . . . . . . 249
How Does SNTP Work?. . . . . . . . . . . . . . 249
What Configuration Is Required for PlugÂIn Modules?
. . . . . . . . . . . . . . . . . . . . 244
. . . . . . 247
. . . . . . . . . . . . . . . . 248
. . . . . . . . . . . . 248
. . . . . . . . . . . . . . . . . . . . 250
14 Contents
Default General System Information . . . . . . . . . 251
Default Port Aggregator Configurations
. . . . . 251
Configuring General System Settings (Web) . . . . . . 254
System Information
. . . . . . . . . . . . . . . . . 254
CLI Banner . . . . . . . . . . . . . . . . . . . . . 257
SDM Template Preference . . . . . . . . . . . . . 258
Operational Mode Configuration
. . . . . . . . . . 259
Port Aggregator Global Configuration . . . . . . . 261
Port Aggregator Port Configuration . . . . . . . . 262
Port Aggregator Group Configuration . . . . . . . 264
Port Aggregator Internal Port VLAN
Configuration
Port Aggregator Port Channel Summary
. . . . . . . . . . . . . . . . . . . . 266
. . . . . . 268
Group VLAN MAC Summary . . . . . . . . . . . . 269
Clock . . . . . . . . . . . . . . . . . . . . . . . . 270
SNTP Global Settings
. . . . . . . . . . . . . . . . 271
SNTP Authentication . . . . . . . . . . . . . . . . 272
SNTP Server . . . . . . . . . . . . . . . . . . . . 274
Summer Time Configuration . . . . . . . . . . . . 278
Time Zone Configuration . . . . . . . . . . . . . . 279
Slot Summary . . . . . . . . . . . . . . . . . . . . 280
Supported Cards . . . . . . . . . . . . . . . . . . 281
Configuring System Settings (CLI)
Configuring System Information
Configuring the Banner
Managing the SDM Template
. . . . . . . . . . . . 282
. . . . . . . . . . 282
. . . . . . . . . . . . . . . 283
. . . . . . . . . . . 284
Configuring the Operational Mode and Port
Aggregator Features
. . . . . . . . . . . . . . . . 284
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . . 286
Setting the System Time and Date Manually. . . . 288
Viewing Slot Information . . . . . . . . . . . . . . 289
General System Settings Configuration Examples . . . 290
Configuring System and Banner Information
. . . 290
Configuring SNTP. . . . . . . . . . . . . . . . . . 293
Configuring the Time Manually . . . . . . . . . . . 295
Contents 15
12 Configuring SNMP . . . . . . . . . . . . . . . . . 297
SNMP Overview . . . . . . . . . . . . . . . . . . . . 297
What Is SNMP?
What Are SNMP Traps?
Why Is SNMP Needed?. . . . . . . . . . . . . . 299
Default SNMP Values . . . . . . . . . . . . . . . . . 299
. . . . . . . . . . . . . . . . . . 297
. . . . . . . . . . . . . 298
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings
Access Control Group
. . . . . . . . . . . . . . . 301
. . . . . . . . . . . . 301
. . . . . . . . . . . . . . . 302
. . . . . . . . . . . . . . 304
SNMPv3 User Security Model (USM) . . . . . . 306
Communities . . . . . . . . . . . . . . . . . . . 309
Notification Filter
. . . . . . . . . . . . . . . . . 311
Notification Recipients . . . . . . . . . . . . . . 312
Trap Flags . . . . . . . . . . . . . . . . . . . . . 315
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . 316
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . 317
Trap Log . . . . . . . . . . . . . . . . . . . . . . 318
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 319
Configuring the SNMPv3 Engine ID
. . . . . . . . 319
Configuring SNMP Views, Groups, and
Users
. . . . . . . . . . . . . . . . . . . . . . . 320
Configuring Communities . . . . . . . . . . . . . 323
Configuring SNMP Notifications (Traps
and Informs)
SNMP Configuration Examples
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . . . . . . 325
. . . . . . . . . . . . 328
. . . . . . . . 328
. . . . . . . . . . . . . . . 329
16 Contents
13 Managing Images and Files . . . . . . . . . 333
Image and File Management Overview . . . . . . . . . 333
What Files Can Be Managed?
Why Is File Management Needed?
What Methods Are Supported for File
Management?
. . . . . . . . . . . . . . . . . . . 337
What Factors Should Be Considered When
Managing Files?
. . . . . . . . . . . . . . . . . . 337
How Is the Running Configuration Saved?. . . . . 339
Managing Images and Files (Web) . . . . . . . . . . . 340
File System
. . . . . . . . . . . . . . . . . . . . . 340
Active Images . . . . . . . . . . . . . . . . . . . 341
File Download. . . . . . . . . . . . . . . . . . . . 342
File Upload . . . . . . . . . . . . . . . . . . . . . 344
Copy Files
. . . . . . . . . . . . . . . . . . . . . . 346
Managing Images and Files (CLI) . . . . . . . . . . . . 347
Downloading and Activating a New Image
. . . . . . . . . . . . . . . . . . . . . . . . 347
(TFTP)
Managing Files in Internal Flash
Uploading a Configuration File (SCP)
Managing Configuration Scripts (SFTP)
. . . . . . . . . . . 333
. . . . . . . . . 335
. . . . . . . . . . 348
. . . . . . . . 349
. . . . . . 350
File and Image Management Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 351
Upgrading the Firmware
. . . . . . . . . . . . . . 351
Managing Configuration Scripts . . . . . . . . . . 354
Contents 17
14 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 357
Auto Configuration Overview . . . . . . . . . . . . . 357
What Is the DHCP Auto Configuration
Process?
Monitoring and Completing the DHCP Auto
Configuration Process
What Are the Dependencies for DHCP Auto
Configuration?
Default Auto Configuration Values . . . . . . . . . . 364
Managing Auto Configuration (Web) . . . . . . . . . 365
Auto-Install Configuration
. . . . . . . . . . . . . . . . . . . . . 357
. . . . . . . . . . . . . . 362
. . . . . . . . . . . . . . . . . . 363
. . . . . . . . . . . . 365
15 Monitoring Switch Traffic . . . . . . . . . . . 369
18 Contents
Managing Auto Configuration (CLI)
Managing Auto Configuration
. . . . . . . . . . 366
. . . . . . . . . . 366
Auto Configuration Example . . . . . . . . . . . . . . 367
Enabling DHCP Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . 367
Traffic Monitoring Overview. . . . . . . . . . . . . . 369
What is sFlow Technology?
What is RMON?
. . . . . . . . . . . . . . . . . . 372
What is Port Mirroring?
. . . . . . . . . . . . 369
. . . . . . . . . . . . . . 373
Why is Traffic Monitoring Needed? . . . . . . . 374
Default Traffic Monitoring Values . . . . . . . . . . . 374
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration
. . . . . . . . . . . 375
. . . . . . . . . . . . . . 375
. . . . . . . . . . 376
sFlow Sampler Configuration. . . . . . . . . . . . 377
sFlow Poll Configuration
. . . . . . . . . . . . . . 378
Interface Statistics . . . . . . . . . . . . . . . . . 379
Etherlike Statistics . . . . . . . . . . . . . . . . . 380
GVRP Statistics
. . . . . . . . . . . . . . . . . . . 381
EAP Statistics. . . . . . . . . . . . . . . . . . . . 382
Utilization Summary . . . . . . . . . . . . . . . . 383
Counter Summary
. . . . . . . . . . . . . . . . . . 384
Switchport Statistics . . . . . . . . . . . . . . . . 385
RMON Statistics . . . . . . . . . . . . . . . . . . 386
RMON History Control Statistics
RMON History Table
RMON Event Control
. . . . . . . . . . . . . . . . 389
. . . . . . . . . . . . . . . . 390
. . . . . . . . . . 387
RMON Event Log . . . . . . . . . . . . . . . . . . 392
RMON Alarms . . . . . . . . . . . . . . . . . . . 393
Port Statistics
. . . . . . . . . . . . . . . . . . . . 395
LAG Statistics. . . . . . . . . . . . . . . . . . . . 396
Port Mirroring. . . . . . . . . . . . . . . . . . . . 397
Monitoring Switch Traffic (CLI)
Configuring sFlow
Configuring RMON
. . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . 401
Viewing Statistics. . . . . . . . . . . . . . . . . . 403
Configuring Port Mirroring . . . . . . . . . . . . . 404
Traffic Monitoring Configuration Examples. . . . . . . 405
Configuring sFlow
Configuring RMON
. . . . . . . . . . . . . . . . . . 405
. . . . . . . . . . . . . . . . . 407
16 Configuring iSCSI Optimization . . . . . . . 409
iSCSI Optimization Overview . . . . . . . . . . . . . . 409
What Does iSCSI Optimization Do?
How Does the Switch Detect iSCSI Traffic
. . . . . . . . . . . . . . . . . . . . . . . . 410
Flows?
. . . . . . . . . 410
Contents 19
How Is Quality of Service Applied to iSCSI
Traffic Flows?
. . . . . . . . . . . . . . . . . . . 410
How Does iSCSI Optimization Use ACLs? . . . . 411
What Information Does the Switch Track in
iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . 411
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 413
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 413
How Does iSCSI Optimization Interact with
. . . . . . . . . . . . . . . . . . . . . . . 414
DCBx?
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . 414
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions
. . . . . . . 415
17 Configuring Captive Portal . . . . . . . . . . 425
20 Contents
Default iSCSI Optimization Values
. . . . . . . . . . . 416
Configuring iSCSI Optimization (Web). . . . . . . . . 417
iSCSI Global Configuration
. . . . . . . . . . . . 417
iSCSI Targets Table . . . . . . . . . . . . . . . . 418
iSCSI Sessions Table . . . . . . . . . . . . . . . 419
iSCSI Sessions Detailed . . . . . . . . . . . . . 420
Configuring iSCSI Optimization (CLI)
. . . . . . . . . 421
iSCSI Optimization Configuration Examples . . . . . 423
Configuring iSCSI Optimization Between
Servers and a Disk Array
. . . . . . . . . . . . . 423
Captive Portal Overview . . . . . . . . . . . . . . . . 425
What Does Captive Portal Do?
. . . . . . . . . . 425
Is the Captive Portal Feature Dependent on
Any Other Feature?
. . . . . . . . . . . . . . . . 426
What Factors Should Be Considered When
Designing and Configuring a Captive Portal?
. . . 427
How Does Captive Portal Work? . . . . . . . . . . 428
What Captive Portal Pages Can Be
Customized?
. . . . . . . . . . . . . . . . . . . . 429
Default Captive Portal Behavior and Settings . . . . . 430
Configuring the Captive Portal (Web)
Captive Portal Global Configuration
Captive Portal Configuration
Local User
User Group
Interface Association
. . . . . . . . . . . . . . . . . . . . . 438
. . . . . . . . . . . . . . . . . . . . . 442
. . . . . . . . . . . . . . . . 444
. . . . . . . . . . 432
. . . . . . . . 432
. . . . . . . . . . . . 433
Captive Portal Global Status . . . . . . . . . . . . 445
Captive Portal Activation and Activity Status . . . 446
Interface Activation Status. . . . . . . . . . . . . 447
Interface Capability Status . . . . . . . . . . . . . 448
Client Summary . . . . . . . . . . . . . . . . . . . 449
Client Detail . . . . . . . . . . . . . . . . . . . . . 450
Captive Portal Interface Client Status
. . . . . . . 451
Captive Portal Client Status . . . . . . . . . . . . 452
Configuring Captive Portal (CLI) . . . . . . . . . . . . . 453
Configuring Global Captive Portal Settings
. . . . . 453
Creating and Configuring a Captive Portal . . . . . 454
Configuring Captive Portal Groups and Users
Managing Captive Portal Clients
. . . . . . . . . . 458
. . . 457
Captive Portal Configuration Example . . . . . . . . . 459
Configuration Overview
Detailed Configuration Procedures
. . . . . . . . . . . . . . . 460
. . . . . . . . 461
Contents 21
18 Configuring Port Characteristics. . . . . . 463
Port Overview . . . . . . . . . . . . . . . . . . . . . 463
What Physical Port Characteristics Can Be
Configured? . . . . . . . . . . . . . . . . . . . . 463
What is Link Dependency? . . . . . . . . . . . . 464
What Interface Types are Supported? . . . . . . 466
What is Interface Configuration Mode? . . . . . 466
Default Port Values. . . . . . . . . . . . . . . . . . . 469
Configuring Port Characteristics (Web)
Port Configuration
. . . . . . . . . . . . . . . . . 470
Link Dependency Configuration
. . . . . . . . 470
. . . . . . . . . 473
Link Dependency Summary . . . . . . . . . . . . 475
Configuring Port Characteristics (CLI). . . . . . . . . 476
Configuring Port Settings
. . . . . . . . . . . . . 476
Configuring Link Dependencies . . . . . . . . . 477
Port Configuration Examples . . . . . . . . . . . . . 479
Configuring Port Settings
. . . . . . . . . . . . . 479
Configuring a Link Dependency Groups . . . . . 480
19 Configuring Port and System
Security . . . . . . . . . . . . . . . . . . . . . . . . . 481
IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . 482
What is IEEE 802.1X?
What are the 802.1X Port States?. . . . . . . . . 483
What is MAC-Based 802.1X Authentication?
What is the Role of 802.1X in VLAN
Assignment?
What is Monitor Mode?
. . . . . . . . . . . . . . . 482
. . . . . . . . . . . . . . . . . . . 485
. . . . . . . . . . . . . . 487
. . . 484
22 Contents
How Does the Authentication Server Assign
DiffServ Filters?
. . . . . . . . . . . . . . . . . . . 489
What is the Internal Authentication Server?. . . . 489
Default 802.1X Values
. . . . . . . . . . . . . . . . 490
Configuring IEEE 802.1X (Web) . . . . . . . . . . . 491
Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 499
Configuring Internal Authentication Server
. . . . . . . . . . . . . . . . . . . . . . . . 504
Users
IEEE 802.1X Configuration Examples . . . . . . . . 504
Port Security (Port-MAC Locking)
Default 802.1X Values
Configuring Port Security (CLI)
Denial of Service
. . . . . . . . . . . . . . . . . . . . 522
. . . . . . . . . . . . 518
. . . . . . . . . . . . . . . . 518
. . . . . . . . . . . 521
20 Configuring Access Control Lists . . . . . 523
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 523
What Are MAC ACLs?
What Are IP ACLs? . . . . . . . . . . . . . . . . . 525
What Is the ACL Redirect Function?
What Is the ACL Mirror Function? . . . . . . . . . 525
What Is ACL Logging . . . . . . . . . . . . . . . . 526
What Are Time-Based ACLs?
What Are the ACL Limitations?. . . . . . . . . . . 527
How Are ACLs Configured?
Preventing False ACL Matches
Configuring ACLs (Web)
IP ACL Configuration
IP ACL Rule Configuration
MAC ACL Configuration . . . . . . . . . . . . . . 534
MAC ACL Rule Configuration. . . . . . . . . . . . 536
IPv6 ACL Configuration . . . . . . . . . . . . . . . 537
. . . . . . . . . . . . . . . 524
. . . . . . . . 525
. . . . . . . . . . . . 526
. . . . . . . . . . . . . 528
. . . . . . . . . . . 528
. . . . . . . . . . . . . . . . . 530
. . . . . . . . . . . . . . . . 530
. . . . . . . . . . . . . 532
Contents 23
IPv6 ACL Rule Configuration . . . . . . . . . . . 538
ACL Binding Configuration . . . . . . . . . . . . 540
Time Range Entry Configuration . . . . . . . . . 541
Configuring ACLs (CLI)
Configuring an IPv4 ACL
Configuring a MAC ACL
. . . . . . . . . . . . . . . . . 543
. . . . . . . . . . . . . 543
. . . . . . . . . . . . . . 545
Configuring an IPv6 ACL . . . . . . . . . . . . . 547
Configuring a Time Range. . . . . . . . . . . . . 549
ACL Configuration Examples. . . . . . . . . . . . . . 551
Configuring an IP ACL
. . . . . . . . . . . . . . . 551
Configuring a MAC ACL . . . . . . . . . . . . . . 553
Configuring a Time-Based ACL
Configuring a Management Access List
. . . . . . . . . . 555
. . . . . 556
21 Configuring VLANs. . . . . . . . . . . . . . . . . 561
VLAN Overview . . . . . . . . . . . . . . . . . . . . 561
Switchport Modes
VLAN Tagging . . . . . . . . . . . . . . . . . . . 565
. . . . . . . . . . . . . . . . . . . . . . . 566
GVRP
Double-VLAN Tagging . . . . . . . . . . . . . . 566
Voice VLAN . . . . . . . . . . . . . . . . . . . . 568
Private VLANs
Additional VLAN Features . . . . . . . . . . . . 576
. . . . . . . . . . . . . . . . 564
. . . . . . . . . . . . . . . . . . . 570
24 Contents
Default VLAN Behavior . . . . . . . . . . . . . . . . 577
Configuring VLANs (Web)
VLAN Membership
VLAN Port Settings
VLAN LAG Settings
Bind MAC to VLAN
Bind IP Subnet to VLAN
. . . . . . . . . . . . . . . 579
. . . . . . . . . . . . . . . . 579
. . . . . . . . . . . . . . . . 584
. . . . . . . . . . . . . . . . 585
. . . . . . . . . . . . . . . . 587
. . . . . . . . . . . . . . 588
GVRP Parameters. . . . . . . . . . . . . . . . . . 590
Protocol Group
Adding a Protocol Group
. . . . . . . . . . . . . . . . . . . 592
. . . . . . . . . . . . . . 593
Double VLAN Global Configuration. . . . . . . . . 595
Double VLAN Interface Configuration . . . . . . . 596
Voice VLAN
. . . . . . . . . . . . . . . . . . . . . 598
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . . 599
Creating a VLAN
. . . . . . . . . . . . . . . . . . 599
Configuring a Port in Access Mode . . . . . . . . 599
Configuring a Port in Trunk Mode
. . . . . . . . . 600
Configuring a Port in General Mode . . . . . . . . 603
Configuring VLAN Settings for a LAG . . . . . . . 604
Configuring Double VLAN Tagging . . . . . . . . . 606
Configuring MAC-Based VLANs . . . . . . . . . . 607
Configuring IP-Based VLANs
. . . . . . . . . . . . 608
Configuring a Protocol-Based VLAN . . . . . . . . 608
Configuring GVRP. . . . . . . . . . . . . . . . . . 610
Configuring Voice VLANs
. . . . . . . . . . . . . . 612
VLAN Configuration Examples
. . . . . . . . . . . . . 613
Configuring VLANs Using Dell OpenManage
Administrator . . . . . . . . . . . . . . . . . . . . 616
Configure the VLANs and Ports on Switch 2
Configuring VLANs Using the CLI
. . . . . . . . . . 621
Configuring a Voice VLAN . . . . . . . . . . . . . 625
22 Configuring the Spanning Tree
Protocol . . . . . . . . . . . . . . . . . . . . . . . . 629
STP Overview . . . . . . . . . . . . . . . . . . . . . . 629
What Are Classic STP, Multiple STP, and
Rapid STP?
How Does STP Work?
How Does MSTP Operate in the Network? . . . . 631
. . . . . . . . . . . . . . . . . . . . . 629
. . . . . . . . . . . . . . . 630
Contents 25
. . . . 620
MSTP with Multiple Forwarding Paths . . . . . . 635
What are the Optional STP Features?
. . . . . . 636
Default STP Values. . . . . . . . . . . . . . . . . . . 639
Configuring Spanning Tree (Web) . . . . . . . . . . . 640
STP Global Settings
. . . . . . . . . . . . . . . . 640
STP Port Settings . . . . . . . . . . . . . . . . . 641
STP LAG Settings . . . . . . . . . . . . . . . . . 643
Rapid Spanning Tree
MSTP Settings
MSTP Interface Settings
. . . . . . . . . . . . . . . 644
. . . . . . . . . . . . . . . . . . 646
. . . . . . . . . . . . . 648
Configuring Spanning Tree (CLI). . . . . . . . . . . . 650
Configuring Global STP Bridge Settings
. . . . . 650
Configuring Optional STP Features . . . . . . . . 651
Configuring STP Interface Settings
. . . . . . . . 652
Configuring MSTP Switch Settings . . . . . . . . 653
Configuring MSTP Interface Settings . . . . . . 654
23 Discovering Network Devices . . . . . . . . 659
26 Contents
STP Configuration Examples
Configuring STP
Configuring MSTP
. . . . . . . . . . . . . . 655
. . . . . . . . . . . . . . . . . . 655
. . . . . . . . . . . . . . . . . 657
Device Discovery Overview . . . . . . . . . . . . . . 659
What Is ISDP?
What is LLDP?
. . . . . . . . . . . . . . . . . . . 659
. . . . . . . . . . . . . . . . . . . 659
What is LLDP-MED? . . . . . . . . . . . . . . . 660
Why are Device Discovery Protocols Needed? . 660
Default IDSP and LLDP Values . . . . . . . . . . . . . 661
Configuring ISDP and LLDP (Web)
ISDP Global Configuration
ISDP Cache Table
. . . . . . . . . . . . . . . . . . 664
. . . . . . . . . . . . 663
. . . . . . . . . . . . . 663
ISDP Interface Configuration. . . . . . . . . . . . 665
ISDP Statistics . . . . . . . . . . . . . . . . . . . 667
LLDP Configuration
. . . . . . . . . . . . . . . . . 668
LLDP Statistics . . . . . . . . . . . . . . . . . . . 670
LLDP Connections . . . . . . . . . . . . . . . . . 671
LLDP-MED Global Configuration
. . . . . . . . . . 673
LLDP-MED Interface Configuration . . . . . . . . 674
LLDP-MED Local Device Information . . . . . . . 676
LLDP-MED Remote Device Information
. . . . . . 677
Configuring ISDP and LLDP (CLI) . . . . . . . . . . . . 678
Configuring Global ISDP Settings
. . . . . . . . . 678
Enabling ISDP on a Port . . . . . . . . . . . . . . 679
Viewing and Clearing ISDP Information . . . . . . 679
Configuring Global LLDP Settings . . . . . . . . . 680
Configuring Port-based LLDP Settings . . . . . . . 680
Viewing and Clearing LLDP Information . . . . . . 681
Configuring LLDP-MED Settings
Viewing LLDP-MED Information
. . . . . . . . . . 682
. . . . . . . . . . 683
Device Discovery Configuration Examples . . . . . . . 683
Configuring ISDP
Configuring LLDP
. . . . . . . . . . . . . . . . . . 683
. . . . . . . . . . . . . . . . . . 684
24 Configuring Port-Based Traffic
Control . . . . . . . . . . . . . . . . . . . . . . . . . 687
Port-Based Traffic Control Overview . . . . . . . . . . 687
What is Flow Control?
What is Storm Control?
. . . . . . . . . . . . . . . 688
. . . . . . . . . . . . . . . 688
Contents 27
What are Protected Ports? . . . . . . . . . . . . 689
What is Link Local Protocol Filtering? . . . . . . 689
Default Port-Based Traffic Control Values . . . . . . 690
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
Storm Control
Protected Port Configuration
. . . . . . . . . . . . . . . . . . . 692
. . . . . . . . . . . 694
. . . . 691
. . . . . . 691
LLPF Configuration . . . . . . . . . . . . . . . . 696
Configuring Port-Based Traffic Control (CLI) . . . . . 698
Configuring Flow Control and Storm Control
. . . 698
Configuring Protected Ports . . . . . . . . . . . 699
Configuring LLPF . . . . . . . . . . . . . . . . . 700
Port-Based Traffic Control Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 701
25 Configuring L2 Multicast Features . . . . 703
L2 Multicast Overview . . . . . . . . . . . . . . . . . 703
What Are the Multicast Bridging Features?
What Is L2 Multicast Traffic? . . . . . . . . . . . 704
What Is IGMP Snooping?
. . . . . . . . . . . . . 705
What Is MLD Snooping? . . . . . . . . . . . . . 707
What Is Multicast VLAN Registration?
When Are L3 Multicast Features Required?
What Are GARP and GMRP? . . . . . . . . . . . 710
. . . 704
. . . . . . 708
. . . 709
28 Contents
Snooping Switch Restrictions. . . . . . . . . . . . . 712
Partial IGMPv3 and MLDv2 Support
. . . . . . . 712
MAC Address-Based Multicast Group . . . . . . 712
IGMP/MLD Snooping in a Multicast Router . . . 712
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier
. . . . . . . 713
Using Static Multicast MAC Configuration. . . . . 713
IGMP Snooping and GMRP
. . . . . . . . . . . . . 713
PCM6220 Restrictions . . . . . . . . . . . . . . . 713
Default L2 Multicast Values . . . . . . . . . . . . . . . 714
Configuring L2 Multicast Features (Web)
Multicast Global Parameters
Bridge Multicast Group
MRouter Status
General IGMP Snooping
. . . . . . . . . . . . . . . 717
. . . . . . . . . . . . . . . . . . . 720
. . . . . . . . . . . . . . 721
Global Querier Configuration
. . . . . . . . 716
. . . . . . . . . . . . 716
. . . . . . . . . . . . 724
VLAN Querier . . . . . . . . . . . . . . . . . . . . 725
VLAN Querier Status . . . . . . . . . . . . . . . . 728
MFDB IGMP Snooping Table
. . . . . . . . . . . . 729
MLD Snooping General. . . . . . . . . . . . . . . 730
MLD Snooping Global Querier Configuration . . . 732
MLD Snooping VLAN Querier . . . . . . . . . . . 733
MLD Snooping VLAN Querier Status . . . . . . . . 735
MFDB MLD Snooping Table . . . . . . . . . . . . 736
MVR Global Configuration . . . . . . . . . . . . . 737
MVR Members
. . . . . . . . . . . . . . . . . . . 738
MVR Interface Configuration . . . . . . . . . . . . 739
MVR Statistics . . . . . . . . . . . . . . . . . . . 742
GARP Timers . . . . . . . . . . . . . . . . . . . . 743
GMRP Parameters . . . . . . . . . . . . . . . . . 745
MFDB GMRP Table . . . . . . . . . . . . . . . . . 747
Configuring L2 Multicast Features (CLI). . . . . . . . . 748
Configuring Layer 2 Multicasting
. . . . . . . . . . 748
Configuring IGMP Snooping on VLANs . . . . . . 749
Configuring IGMP Snooping Querier . . . . . . . . 750
Configuring MLD Snooping on VLANs
. . . . . . . 751
Configuring MLD Snooping Querier . . . . . . . . 752
Contents 29
Configuring MVR . . . . . . . . . . . . . . . . . 753
Configuring GARP Timers and GMRP. . . . . . . 755
Case Study on a Real-World Network Topology . . . 756
Multicast Snooping Case Study
. . . . . . . . . 756
26 Configuring Connectivity Fault
Management . . . . . . . . . . . . . . . . . . . . . 761
Dot1ag Overview. . . . . . . . . . . . . . . . . . . . 761
How Does Dot1ag Work Across a Carrier
Network?
What Entities Make Up a Maintenance
Domain?
What is the Administrator’s Role? . . . . . . . . 765
Default Dot1ag Values . . . . . . . . . . . . . . . . . 766
. . . . . . . . . . . . . . . . . . . . . 762
. . . . . . . . . . . . . . . . . . . . . . 763
30 Contents
Configuring Dot1ag (Web)
Dot1ag Global Configuration
Dot1ag MD Configuration
. . . . . . . . . . . . . . . 767
. . . . . . . . . . . 767
. . . . . . . . . . . . . 767
Dot1ag MA Configuration. . . . . . . . . . . . . 768
Dot1ag MEP Configuration . . . . . . . . . . . . 769
Dot1ag MIP Configuration
. . . . . . . . . . . . 770
Dot1ag RMEP Summary. . . . . . . . . . . . . . 771
Dot1ag L2 Ping
Dot1ag L2 Traceroute
. . . . . . . . . . . . . . . . . . 772
. . . . . . . . . . . . . . . 772
Dot1ag L2 Traceroute Cache . . . . . . . . . . . 773
Dot1ag Statistics . . . . . . . . . . . . . . . . . 774
Configuring Dot1ag (CLI) . . . . . . . . . . . . . . . . 775
Configuring Dot1ag Global Settings and
Creating Domains
Configuring MEP Information
. . . . . . . . . . . . . . . . . 775
. . . . . . . . . . . 776
Dot1ag Ping and Traceroute . . . . . . . . . . . 777