Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, PowerEdge, PowerConnect, and OpenManage are trademarks of Dell Inc.; Microsoft and Windows are registered trademarks of Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
This section describes the switch user-configurable features. For a list of all features, see the software
version release notes.
Note: Before proceeding, read the release notes for this product. You can download the release notes from
the Dell Support website, support.dell.com.
The Dell™ PowerConnect™ M6348 is a Stackable Layer 3, Gigabit Ethernet modular switch for use
in the Dell M1000e Chassis
The Dell™ PowerConnect™ M8024 is a non-Stackable Layer 3, 10 Gigabit Ethernet modular switch
for use in the Dell M1000e Chassis.
The Dell™ PowerConnect™ M6220 is a Stackable Layer 3, Gigabit Ethernet modular switch for use
in the Dell M1000e Chassis.
The topics covered in this section include:
•System Features
•Switching Features
•Routing Features
•IPv6
•Quality of Service Features
•Multicast Features
•CLI Documentation
1
Introduction15
System Features
sFlow
sFlow is the standard for monitoring high-speed switched and routed networks. sFlow technology is built
into network equipment and gives complete visibility into network activity, enabling effective
management and control of network resources.
CDP Interoperability
Allows the PowerConnect switch to interoperate with Cisco™ devices running CDP.
Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2 network protocol which interoperates with Cisco network equipment and is used to share information between neighboring devices
(routers, bridges, access servers, and switches).
Auto Config
Auto Config is a software feature which provides for the configuration of a switch automatically when
the device is initialized and no configuration file is found on the switch. Auto Config is accomplished in
three phases:
Configuration or assignment of an IP address for the device
1.
2.
Assignment of a TFTP server
3.
Obtaining a configuration file for the device from the TFTP server
Captive Portal
Blocks clients from accessing the network until user verification has been established. Verification can be
configured to allow access for both guest and authenticated users. Authenticated users must be validated
against a database of authorized Captive Portal users before access is granted.
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. The events are sent as SNMP traps to a trap
recipient list.
For information about SNMP Alarms and Traps, see "Defining SNTP Global Parameters."
Web Based Management
You can manage the system from any web browser. The switch contains an embedded web server that
serves HTML pages you can use to monitor and configure the system.
Configuration File Download
The switch’s configuration file includes both system-wide and port-specific device configuration data.
You can display configuration files through command-line interface (CLI) commands.
For information about downloading configuration files, see "Downloading Files."
16Introduction
Software Download
Software download enables storage of backup firmware images. For information about downloading the
software, see "Software Download and Reboot
Trivial File Transfer Protocol (TFTP)
.
"
The PowerConnect M6220/M6348/M8024 switches support boot image, firmware, and configuration
upload or download through TFTP.
Remote Monitoring (RMON)
RMON is a standard Management Information Base (MIB) that defines current and historical MAClayer statistics and control objects, allowing real-time information to be captured across the entire
network.
Simple Network Management Protocol (SNMP) Versions 1, 2, and 3
The system is fully manageable using a combination of MIB variables, whose combined values represent
all facets of the system state, and the SNMP protocol to examine and possibly modify these values.
SNMP v1/v2c/v3 over the UDP/IP transport protocol is supported.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry
practice. CLI is composed of mandatory and optional elements. Context-sensitive help provides format
and value ranges allowed for current commands, and the CLI interpreter provides command and
keyword completion.
Syslog
Syslog is a protocol that allows event notifications to be sent to a set of desired remote servers where they
can be stored, examined, and acted upon.
For information about Syslog, see "Managing Logs."
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network switch clock time synchronization
up to the millisecond. Time synchronization is performed by a network SNTP server.
For more information about SNTP, see "Configuring SNTP Settings."
Simple Mode
Users with a privilege level of 15 can configure the switch to operate in normal mode or simple mode. By
default, the switch operates in normal mode. When the PowerConnect M6220/M6348/M8024 Series is
operating in simple mode, a limited number of features are available to configure. For features that are
not available in simple mode, their administrative Web pages and CLI commands are unavailable.
For more information about Simple Mode, see "Setting the Operational Mode."
Introduction17
Port Aggregator
The Port Aggregator feature minimizes the administration required for managing the PowerConnect
M6220/M6348/M8024. When the switch is operating in simple mode, the administrator can map
internal ports to external ports without having to know anything about STP, VLANs, Link Aggregation or
other L2/L3 protocols.
For more information configuring the Port Aggregator feature, see "Using the Port Aggregator Feature."
Switching Features
Low Power on Short Cables
For cables of different length, a different level of power back-off should be set for active link to achieve
good level of signal and stable data transmit. Power back-off level is determined during the autonegotiation phase. Users can configure or view the maximum length of cable that is connected to
transceiver.
IPv6 Access Control Lists
An IPv6 ACL consists of a set of rules which are matched sequentially against a packet. When a packet
meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional
rules are not checked for a match.
Access Control List (ACL) Outbound Support
Supports binding of an acl (IP, MAC, or IPV6) in outbound direction on physical, LAG, and VLAN
interfaces
IP Source Guard (IPSG)
IP source guard (IPSG) is a security feature that filters IP packets based on the source ID. The source ID
may either be source IP address or a source IP address source MAC address pair. IPSG is disabled by
default.
DHCP Snooping
DHCP Snooping is a security feature that monitors DHCP messages between a DHCP client and DHCP
server. It filters harmful DHCP messages and builds a bindings database of (MAC address, IP address,
VLAN ID, port) tuples that are specified as authorized. DHCP snooping can be enabled globally and on
specific VLANs. Ports within the VLAN can be configured to be trusted or untrusted. DHCP servers
must be reached through trusted ports.
DHCP L2 Relay
Permits L3 Relay agent functionality in L2 switched networks.
18Introduction
Dynamic ARP Inspection
Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The
feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for
other stations by poisoning the ARP caches of its unsuspecting neighbors. The miscreant sends ARP
requests or responses mapping another station's IP address to its own MAC address.
Dynamic ARP Inspection relies on DHCP Snooping.
MLD Snooping
In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of multicast traffic by
dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces
associated with IP multicast address.
In IPv6, MLD snooping performs a similar function. With MLD snooping, IPv6 multicast data is
selectively forwarded to a list of ports intended to receive the data (instead of being flooded to all of the
ports in a VLAN). This list is constructed by snooping IPv6 multicast control packets.
IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping is a feature that allows a switch to forward
multicast traffic intelligently on the switch. Multicast IP traffic is traffic that is destined to a host group.
Host groups are identified by class D IP addresses, which range from 224.0.0.0 to 239.255.255.255. Based
on the IGMP query and report messages, the switch forwards traffic only to the ports that request the
multicast traffic. This prevents the switch from broadcasting the traffic to all ports and possibly affecting
network performance.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing
packets from up to four source ports to a monitoring port.
Broadcast Storm Control
When Layer 2 frames are forwarded, broadcast, unknown unicast, and multicast frames are flooded to all
ports on the relevant virtual local area network (VLAN). The flooding occupies bandwidth, and loads all
nodes connected on all ports. Storm control limits the amount of broadcast, unknown unicast, and
multicast frames accepted and forwarded by the switch.
Introduction19
Port-Based Features
Jumbo Frames Support
Jumbo frames enable transporting identical data in fewer frames to ensure less overhead, lower
processing time, and fewer interrupts.
Auto-MDI/MDIX Support
Your switch supports auto-detection between crossed and straight-through cables.
Media-Dependent Interface (MDI) is the standard wiring for end stations, and the standard wiring for
hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
Auto Negotiation
Auto negotiation allows the switch to advertise modes of operation. The auto negotiation function
provides the means to exchange information between two switches that share a point-to-point link
segment, and to automatically configure both switches to take maximum advantage of their transmission
capabilities.
The PowerConnect M6220/M6348/M8024 enhances auto negotiation by providing port advertisement.
Port advertisement allows the system administrator to configure the port speeds advertised.
For information about auto negotiation, see "Port Configuration" or "LAG Configuration."
Flow Control Support (IEEE 802.3x)
Flow control enables lower speed switches to communicate with higher speed switches by requesting
that the higher speed switch refrains from sending packets. Transmissions are temporarily halted to
prevent buffer overflows.
For information about configuring flow control for ports or LAGs, see "Port Configuration" or "LAG
Configuration."
Head of Line Blocking Prevention
Head of Line (HOL) blocking prevention prevents traffic delays and frame loss caused by traffic
competing for the same egress port resources. HOL blocking queues packets, and the packets at the head
of the queue are forwarded before packets at the end of the queue.
Back Pressure Support
On half-duplex links, a receiver may prevent buffer overflows by occupying the link so that it is
unavailable for additional traffic.
20Introduction
Alternate Store and Forward (ASF)
The Alternate Store and Forward (ASF) feature reduces latency for large packets. When ASF is enabled,
the memory management unit (MMU) can forward a packet to the egress port before it has been entirely
received on the Cell Buffer Pool (CBP) memory. AFS, which is also known as cut-through mode, is
configurable through the command-line interface. For information about how to configure the AFS
feature, see the
CLI Reference Guide
, which is located on the Dell Support website at
www.support.dell.com/manuals.
Link Dependency Features
The link dependency feature provides the ability to enable or disable one or more ports based on the
state of the link of one or more ports.
For information about Link Dependency, see "Creating Link Dependencies."
Virtual Local Area Network Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified
as belonging to a VLAN based on either the VLAN tag or a combination of the ingress port and packet
contents. Packets sharing common attributes can be groups in the same VLAN.
For information about configuring VLANs, see "Configuring VLANs."
Port-Based VLANs
Port-based VLANs classify incoming packets to VLANs based on their ingress port. When a port uses
802.1X port authentication, packets can be assigned to a VLAN based on the result of the 802.1X
authentication a client uses when it accesses the switch. This feature is useful for assigning traffic to
Guest VLANs or Voice VLANs.
For information about configuring VLANs, see "Configuring VLANs."
IEEE 802.1v Protocol-Based VLANs
VLAN classification rules are defined on data-link layer (Layer 2) protocol identification. Protocol-based
VLANs are used for isolating Layer 2 traffic for differing Layer 3 protocols.
For information about defining Protocol-Based VLANs, see "Protocol Group."
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual bridged LANs, the services provided in VLANs, and the
protocols and algorithms involved in the provision of these services.
Introduction21
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-compliant VLAN pruning and
dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the switch registers and
propagates VLAN membership on all ports that are part of the active spanning tree protocol topology.
For information about configuring GVRP, see "GVRP Parameters."
Protected Ports (Private VLAN Edge)
Private VLAN Edge (PVE) ports are a Layer 2 security feature that provides port-based security between
ports that are members of the same VLAN. It is an extension of the common VLAN. Traffic from
protected ports is sent only to the uplink ports and cannot be sent to other ports within the VLAN.
Subnet-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the
source IP address of the packet.
For information about configuring Subnet-based VLANs, see "Bind IP Subnet to VLAN."
MAC-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the
source MAC address of the packet.
For information about configuring MAC-based VLANs, see "Bind MAC to VLAN."
Double VLANs
The Double VLAN feature allows the use of a second tag on network traffic. The additional tag helps
differentiate between customers in the Metropolitan Area Networks (MAN) while preserving individual
customer’s VLAN identification when they enter their own 802.1Q domain.
Protocol-based VLANs
In a protocol-based VLAN, traffic is bridged through specified ports based on the VLAN’s protocol. Userdefined packet filters determine if a particular packet belongs to a particular VLAN. Protocol-based
VLANs are most often used in situations where network segments contain hosts running multiple
protocols.
22Introduction
Spanning Tree Protocol Features
Spanning Tree now supports IEEE802.1Q-2005
This version of the IEEE Multiple Spanning Tree Protocol corrects problems associated with the previous
version, provides for faster transition-to-forwarding, and incorporates new features for a port (restricted
role and restricted TCN).
Spanning Tree Enhancements
•
Loop Guard
forwarding when the port stops receiving BPDUs. The port is marked as being in loop-inconsistent
state. In this state, the port does not forward packets. The possible values are Enable or Disable.
TCN Guard
•
change information received through that port. This means that even if a port receives a BPDU with
the topology change flag set to true, the port will not flush its MAC address table and send out a BPDU
with a topology change flag set to true.
•
Auto Edge
BPDUs for some duration.
•
BPDU Filter
on this port.
BPDU Flood
•
when STP is disabled on this port.
Spanning Tree Protocol (STP) per Switch
802.1d STP is a standard requirement of Layer 2 switches that allows bridges to automatically prevent
and resolve L2 forwarding loops.
For information about configuring Spanning Tree Protocol, see "Configuring the Spanning Tree
Protocol."
— This feature prevents a port from erroneously transitioning from blocking state to
— Enabling the TCN Guard feature restricts the port from propagating any topology
— Enabling the Auto Edge feature allows the port to become an edge port if it does not see
— When enabled, this feature filters the BPDU traffic on this port when STP is enabled
— When enabled, the BPDU Flood feature floods the BPDU traffic arriving on this port
IEEE 802.1w Rapid Spanning Tree
Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies to enable faster spanning tree
convergence after a topology change, without creating forwarding loops.
For information about configuring Rapid Spanning Tree Protocol, see "Rapid Spanning Tree."
Multiple Spanning Tree
Multiple Spanning Tree (MSTP) operation maps VLANs to spanning tree instances. Packets assigned to
various VLANs are transmitted along different paths within MSTP Regions (MST Regions). Regions are
one or more interconnected MSTP bridges with identical MSTP settings. The MSTP standard lets
administrators assign VLAN traffic to unique paths.
For information about configuring Multiple Spanning Tree, see "MSTP Settings."
Introduction23
Spanning Tree Root Guard
Spanning Tree Root Guard is used to prevent the root of a Spanning Tree instance from changing
unexpectedly. The priority of a Bridge ID can be set to zero but another Bridge ID with a lower mac
address could also set its priority to zero and take over root.
Bridge Protocol Data Unit Guard
Spanning Tree BPDU Guard is used to disable the port in case a new device tries to enter the already
existing topology of STP. Thus devices, which were originally not a part of STP, are not allowed to
influence the STP topology.
Link Aggregation Features
Link Aggregation
Up to eight ports can combine to form a single Link Aggregated Group (LAG). This enables fault
tolerance protection from physical link disruption, higher bandwidth connections and improved
bandwidth granularity.
A LAG is composed of ports of the same speed, set to full-duplex operation.
For information about configuring LAGs, see "LAG Configuration."
Link Aggregation and LACP
Link Aggregate Control Protocol (LACP) uses peer exchanges across links to determine, on an ongoing
basis, the aggregation capability of various links, and continuously provides the maximum level of
aggregation capability achievable between a given pair of systems. LACP automatically determines,
configures, binds, and monitors the binding of ports to aggregators within the system.
For information about LACP, see "LACP Parameters."
24Introduction
Routing Features
VLAN Routing
The PowerConnect M6220/M8024/M6348 software supports VLAN routing. You can also configure the
software to allow traffic on a VLAN to be treated as if the VLAN were a router port.
Routing Information Protocol (RIP)
The route configuration and route preference features have the following changes:
•You can configure static reject routes (see Static Reject Routes).
•The default values for route preferences have changed.
•OSPF Type-1 and OSPF Type-2 routes are now classified as OSPF External routes.
OSPF Configuration
The Maximum Paths field allows OSPF to report a maximum of 4 paths for a given destination.
The following fields have been added for OSPF configuration options:
•Opaque LSA Status
•AS_OPAQUE LSA Count
•AS_OPAQUE LSA Checksum
•External LSDB Limit
•AutoCost Reference Bandwidth
•Default Passive Setting
•Stub Area Type of Service
•NSSA Information
The OSPF Link State Database page has been updated to display external LSDB table information and
AS opaque LSDB table information (in addition to OSPF link state information).
IP Configuration
The switch IP configuration settings have been enhanced to allow you to enable or disable the generation
of the following types of ICMP messages:
•ICMP Echo Replies
•ICMP Redirects
•ICMP Rate Limit Interval
•ICMP Rate Limit Burst Size
Introduction25
IP Interface Configuration
IP interface configuration includes the ability to configure the bandwidth, Destination Unreachable
messages, and ICMP Redirect messages.
IP Helper
Provides the ability to relay various protocols to servers on a different subnet.
VRRP Route Interface Tracking
Extends the capability of the Virtual Router Redundancy Protocol (VRRP) to allow tracking of specific
route/interface IP state within the router that can alter the priority level of a virtual router for a VRRP
group.
The exception to this is, if that VRRP group is the IP address owner, its priority is fixed at 255 and can
not be reduced through tracking process.
MAC Address Supported Features
MAC Address Support
The switch supports up to 8K Media Access Control (MAC) addresses and reserves two MAC addresses
for system use.
Self-Learning MAC Addresses
The switch enables MAC addresses to be automatically learned from incoming packets.
Automatic Aging for MAC Addresses
MAC addresses that have not seen any traffic for a given period are aged out, which prevents the bridging
table from overflowing.
For information about configuring the MAC Address age-out period, see "Dynamic Address Table."
Static MAC Entries
User-defined MAC entries are stored in the Bridging Table with the self-learned addresses.
For information about configuring the static MAC addresses, see "Static Address Table."
VLAN-Aware MAC-based Switching
Packets arriving from an unknown source address are sent to the CPU and added to the Hardware Table.
Future packets addressed to or from this address are more efficiently forwarded.
26Introduction
MAC Multicast Support
Multicast service is a limited broadcast service that allows one-to-many and many-to-many connections.
In Layer 2 multicast services, a single frame addressed to a specific multicast address is received, and
copies of the frame to be transmitted on each relevant port are created.
For information about configuring MAC Multicast Support, see "Managing Multicast Support."
IPv4 Routing Features
Address Resolution Protocol
The PowerConnect M6220/M6348/M8024 uses the ARP protocol to associate a layer 2 MAC address
with a layer 3 IPv4 address. Additionally, the administrator can statically add entries in to the ARP table.
Open Shortest Path First
The Open Shortest Path First (OSPF) Routing protocol defines two area types: regular OSPF area and
OSPF stub area. OSPF internal and external route information may be propagated throughout the
regular OSPF area; it is capable of supporting transit traffic and virtual links. OSPF stub areas do not
receive external route information; the motivation to configure stub areas is to limit the size of the area
database for those routers that have limited resources.
BOOTP/DHCP Relay Agent
The BootP protocol allows a device to solicit and receive configuration data and parameters from a
suitable server. DHCP is an extension to BootP allowing additional setup parameters to be received from
a network server upon system startup. Notably, while BootP stops operating once an IP address is
obtained, DHCP service is an on-going process. For example, the IP address assigned to the system has a
‘lease time’ that may expire, and can be renewed on the fly.
Routing Information Protocol
The routing protocol used within an autonomous Internet system is referred to as an interior gateway
protocol (IGP). RIP is an IGP that is designed to work with moderate-size networks.
Virtual Routing Redundancy Protocol
Virtual Routing Redundancy Protocol (VRRP) is used to provide hosts with redundant routers in the
network topology without any need for the hosts to reconfigure or know that there are multiple routers.
Introduction27
IPv6 Routing Features
IPv6 6 to 4 Auto Tunnels
Automatically formed IPv4 6 to 4 tunnels for carrying IPv6 traffic. The automatic tunnel IPv4
destination address is derived from the 6 to 4 IPv6 address of the tunnel nexthop. There is support the
functionality of a 6 to 4 border router that connects a 6 to 4 site to a 6 to 4 domain. It sends/receives
tunneled traffic from routers in a 6 to 4 domain that includes other 6 to 4 border routers and 6 to 4 relay
routers.
DHCPv6
DHCPv6 incorporates the notion of the “stateless” server, where DHCPv6 is not used for IP address
assignment to a client, rather it only provides other networking information such as DNS, Network Time
Protocol (NTP), and/or Session Initiation Protocol (SIP) information.
OSPFv3
OSPFv3 provides a routing protocol for IPv6 networking. OSPFv3 is a new routing component based on
the OSPF version 2 component. In dual stack IPv6, you can configure and use both OSPF and OSPFv3
components.
IPv6 Routes
Since IP4 and IPV6 can coexist on a network, the router on such a network needs to forward both traffic
types. Given this coexistence, the PowerConnect M6220/M6348/M8024 maintains two routing tables,
rto and rto6, which are both capable of forwarding over the same set of interfaces. IPV6 interfaces are
managed in a manner similar to IPV4 interfaces.
IPv6
IPv6 Route Configuration Enhancements
The route configuration and route preference features have the following changes:
You can configure static reject routes.
The default values for route preferences have changed as follows:
•OSPFv3 Intra — 110
•OSPFv3 Inter — 110
•OSPFv3 External — 110
OSPF Type-1 and OSPF Type-2 routes are now classified as OSPF External routes.
28Introduction
Loading...
+ 707 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.