Dell EMC Networking N-Series
N1100-ON, N1500, N2000,
N2100-ON, N3000, N3100-ON,
and N4000 Switches
User’s Configuration
Guide
Version 6.3.0.x - N2000/N3000/N4000 Series Switches
Version 6.3.5.x - N3100-ON Series Switches
Version 6.3.6.x - N2100-ON/N3100-ON Series Switches
Version 6.4.x.x - N1100-ON Series Switches
Regulatory Models: E04W, E05W, E06W,
E07W, E15W, E16W, E17W, E18W,
PowerConnect 8132, PowerConnect 8132F,
PowerConnect 8164, PowerConnect 8164F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
Copyright © 2017 Dell EMC Inc. All rights reserved. This product is protected by U.S. and
international copyright and intellectual property laws. Dell EMC™ and the Dell EMC logo are
trademarks of Dell EMC Inc. in the United States and/or other jurisdictions. All other marks and names
mentioned herein may be trademarks of their respective companies.
Marketing Models: N1108T-ON, N1108P-ON, N1124T-ON, N1124P-ON, N1148T-ON, N1148P-ON, N1524, N1524P, N15 48, N1548P, N2024,
N2024P, N2048, N2048P, N2128PX-ON , N3024, N3024F, N3024P, N3048, N3048P, N3132PX-ON, N4032, N4032F, N4064 , N4064F
Regulatory Models: E04W, E05W, E06W, E07W, E15W, E16W, E17W, E18W, PowerConnect 8132, PowerConnect 8132F,
PowerConnect 8164, PowerConnect 8164F
June 2017 Rev. A04
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 55
About This Document . . . . . . . . . . . . . . . . . . 55
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 56
Document Conventions
Additional Documentation
. . . . . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . 57
2 Switch Feature Overview . . . . . . . . . . . . 59
System Management Features . . . . . . . . . . . . . 60
Multiple Management Options
System Time Management . . . . . . . . . . . . . 60
Log Messages
. . . . . . . . . . . . . . . . . . . 61
Integrated DHCP Server
Management of Basic Network Information . . . . 61
IPv6 Management Features
Dual Software Images
File Management . . . . . . . . . . . . . . . . . . 62
Switch Database Management Templates
Automatic Installation of Firmware and
Configuration . . . . . . . . . . . . . . . . . . . . 63
sFlow
. . . . . . . . . . . . . . . . . . . . . . . . 64
SNMP Alarms and Trap Logs
CDP Interoperability Through ISDP . . . . . . . . 65
Remote Monitoring (RMON)
N3000 Series Access and Aggregation
Firmware Images . . . . . . . . . . . . . . . . . . 65
. . . . . . . . . . . 60
. . . . . . . . . . . . . . 61
. . . . . . . . . . . . 62
. . . . . . . . . . . . . . . 62
. . . . 63
. . . . . . . . . . . . 64
. . . . . . . . . . . . 65
Contents 3
Stacking Features . . . . . . . . . . . . . . . . . . . . 67
High Stack Count
Single IP Management
. . . . . . . . . . . . . . . . . . 67
. . . . . . . . . . . . . . . 67
Master Failover with Transparent Transition. . . . 68
Nonstop Forwarding on the Stack
. . . . . . . . . 68
Hot Add/Delete and Firmware
Synchronization. . . . . . . . . . . . . . . . . . . 68
Security Features . . . . . . . . . . . . . . . . . . . . 69
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 69
Profiles
Password-Protected Management Access
Strong Password Enforcement
. . . . . . . . . . . 69
. . . . 69
TACACS+ Client . . . . . . . . . . . . . . . . . . . 69
RADIUS Support
SSH/SSL
. . . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . . . . . . . . . 70
Inbound Telnet Control . . . . . . . . . . . . . . . 70
Denial of Service
Port Protection
Captive Portal
802.1X Authentication (IEEE 802.1X)
. . . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . . . . . 71
. . . . . . . . . . . . . . . . . . . . 72
. . . . . . . . 72
MAC-Based 802.1X Authentication . . . . . . . . . 73
802.1X Monitor Mode
MAC-Based Port Security
. . . . . . . . . . . . . . . . 73
. . . . . . . . . . . . . 73
Access Control Lists (ACLs) . . . . . . . . . . . . 74
Time-Based ACLs
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . . . . 74
. . . . . . . . . . . . . . . 74
DHCP Snooping . . . . . . . . . . . . . . . . . . . 75
Dynamic ARP Inspection
Protected Ports (Private VLAN Edge)
. . . . . . . . . . . . . . 75
. . . . . . . . 75
4 Contents
Green Technology Features
Energy Detect Mode
Energy Efficient Ethernet
. . . . . . . . . . . . . . . 76
. . . . . . . . . . . . . . . . 76
. . . . . . . . . . . . . . 76
Power Utilization Reporting . . . . . . . . . . . . 76
Power over Ethernet (PoE) Plus Features
. . . . . . . . 77
Key PoE Plus Features for the Dell EMC
Networking N1108P-ON, N1124P-ON, N1148P-ON,
N2024P, N2048P, N2128PX-ON, N3024P, N3048P,
and N3132PX-ON Switches
. . . . . . . . . . . . . 77
Power Over Ethernet (PoE) Plus Configuration
PoE Plus Support
. . . . . . . . . . . . . . . . . . 78
PoE 60W Support . . . . . . . . . . . . . . . . . . 79
Powered Device Detection . . . . . . . . . . . . . 79
PoE Power Management Modes. . . . . . . . . . 79
Power Management in Guard Band
PoE Plus Default Settings
Switching Features
. . . . . . . . . . . . . . . . . . . 83
Flow Control Support (IEEE 802.3x)
Head of Line Blocking Prevention
. . . . . . . . . . . . . . 82
. . . . . . . . 81
. . . . . . . . . 83
. . . . . . . . . 83
Alternate Store and Forward (ASF). . . . . . . . . 83
Jumbo Frames Support
Auto-MDI/MDIX Support
. . . . . . . . . . . . . . . 83
. . . . . . . . . . . . . . 84
VLAN-Aware MAC-based Switching. . . . . . . . 84
Back Pressure Support
Auto-negotiation
. . . . . . . . . . . . . . . 84
. . . . . . . . . . . . . . . . . . 85
Storm Control . . . . . . . . . . . . . . . . . . . . 85
Port Mirroring
Static and Dynamic MAC Address Tables
. . . . . . . . . . . . . . . . . . . . 85
. . . . . 86
Link Layer Discovery Protocol (LLDP) . . . . . . . 86
Link Layer Discovery Protocol (LLDP) for Media
Endpoint Devices
. . . . . . . . . . . . . . . . . . 86
Connectivity Fault Management (IEEE 802.1ag) . . 87
Priority-based Flow Control (PFC) . . . . . . . . . 87
Data Center Bridging Exchange (DBCx)
Protocol. . . . . . . . . . . . . . . . . . . . . . . 88
Enhanced Transmission Selection
. . . . . . . . . 88
. . 78
Contents 5
Cisco Protocol Filtering . . . . . . . . . . . . . . . 88
DHCP Layer-2 Relay
. . . . . . . . . . . . . . . . . 89
Virtual Local Area Network Supported Features
VLAN Support
Port-Based VLANs
. . . . . . . . . . . . . . . . . . . . 90
. . . . . . . . . . . . . . . . . 90
IP Subnet-based VLAN . . . . . . . . . . . . . . . 90
MAC-based VLAN
IEEE 802.1v Protocol-Based VLANs
. . . . . . . . . . . . . . . . . . 90
. . . . . . . . . 90
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 90
GARP and GVRP Support
Guest VLAN
. . . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . . . 91
Unauthorized VLAN . . . . . . . . . . . . . . . . . 91
Double VLANs
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Port Settings
Rapid Spanning Tree
. . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . 92
. . . . . . . . . . . 92
. . . . . . . . . . . . 92
. . . . . . . . . . . . . . . . 92
Multiple Spanning Tree . . . . . . . . . . . . . . . 92
Bridge Protocol Data Unit (BPDU) Guard
BPDU Filtering
RSTP-PV and STP-PV
Link Aggregation Features
Link Aggregation
. . . . . . . . . . . . . . . . . . . 93
. . . . . . . . . . . . . . . . 93
. . . . . . . . . . . . . . . . 94
. . . . . . . . . . . . . . . . . . 94
Link Aggregate Control Protocol (LACP)
Multi-Switch LAG (MLAG)
. . . . . . . . . . . . . 95
. . . . . . 93
. . . . . . 95
. . . . 90
6 Contents
Routing Features
. . . . . . . . . . . . . . . . . . . . . 96
Address Resolution Protocol (ARP) Table
Management
. . . . . . . . . . . . . . . . . . . . 96
VLAN Routing . . . . . . . . . . . . . . . . . . . . 96
IP Configuration
Open Shortest Path First (OSPF)
. . . . . . . . . . . . . . . . . . . 96
. . . . . . . . . . 97
Border Gateway Protocol (BGP) . . . . . . . . . . 97
Virtual Routing and Forwarding (VRF)
. . . . . . . 97
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 98
IP Helper and DHCP Relay . . . . . . . . . . . . . 98
Routing Information Protocol. . . . . . . . . . . . 98
Router Discovery
Routing Table
. . . . . . . . . . . . . . . . . . 98
. . . . . . . . . . . . . . . . . . . . 98
Virtual Router Redundancy Protocol (VRRP) . . . . 99
Tunnel and Loopback Interfaces
. . . . . . . . . . 99
IPv6 Routing Features
IPv6 Configuration
IPv6 Routes
OSPFv3
. . . . . . . . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . . . . . 100
DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 100
Quality of Service (QoS) Features . . . . . . . . . . . . 101
Differentiated Services (DiffServ)
. . . . . . . . . 101
Class Of Service (CoS) . . . . . . . . . . . . . . . 101
Auto Voice over IP (VoIP)
. . . . . . . . . . . . . . 101
Internet Small Computer System Interface
(iSCSI) Optimization. . . . . . . . . . . . . . . . . 102
Layer-2 Multicast Features . . . . . . . . . . . . . . . 102
MAC Multicast Support
. . . . . . . . . . . . . . . 102
IGMP Snooping . . . . . . . . . . . . . . . . . . . 102
IGMP Snooping Querier
MLD Snooping
. . . . . . . . . . . . . . . . . . . 103
. . . . . . . . . . . . . . 103
Multicast VLAN Registration . . . . . . . . . . . . 103
Layer-3 Multicast Features . . . . . . . . . . . . . . . 104
Distance Vector Multicast Routing Protocol
. . . . 104
Internet Group Management Protocol . . . . . . . 104
IGMP Proxy
. . . . . . . . . . . . . . . . . . . . . 104
Contents 7
Protocol Independent Multicast—Dense
Mode . . . . . . . . . . . . . . . . . . . . . . . 104
Protocol Independent Multicast—Sparse
Mode . . . . . . . . . . . . . . . . . . . . . . . 105
Protocol Independent Multicast—Source
Specific Multicast. . . . . . . . . . . . . . . . . 105
Protocol Independent Multicast IPv6
Support
. . . . . . . . . . . . . . . . . . . . . . 105
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . 105
3 Hardware Overview . . . . . . . . . . . . . . . . 107
Dell EMC Networking N1100-ON Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 107
Front Panel
Power Supply
Ventilation System
Thermal Shutdown
LED Definitions
. . . . . . . . . . . . . . . . . . . . 107
. . . . . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . . . 110
Power Consumption for PoE Switches . . . . . . 114
Wall Installation. . . . . . . . . . . . . . . . . . 115
8 Contents
Dell EMC Networking N1500 Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 117
Front Panel
. . . . . . . . . . . . . . . . . . . . 117
Back Panel . . . . . . . . . . . . . . . . . . . . 121
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . 122
. . . . . . 125
Dell EMC Networking N2000 Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 127
Front Panel
. . . . . . . . . . . . . . . . . . . . 127
Back Panel . . . . . . . . . . . . . . . . . . . . 130
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . 132
. . . . . . 135
Dell EMC Networking N2100-ON Series Switch
Hardware . . . . . . . . . . . . . . . . . . . . . . . . 137
Front Panel
. . . . . . . . . . . . . . . . . . . . . 137
Back Panel . . . . . . . . . . . . . . . . . . . . . 139
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 139
. . . . . . . 143
Dell EMC Networking N3000 Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 146
Front Panel
. . . . . . . . . . . . . . . . . . . . . 146
Back Panel . . . . . . . . . . . . . . . . . . . . . 151
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 153
. . . . . . . 158
Dell EMC Networking N3100-ON Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 160
Front Panel
. . . . . . . . . . . . . . . . . . . . . 160
Back Panel . . . . . . . . . . . . . . . . . . . . . 162
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 163
. . . . . . . 168
PoE Power Budget Limit . . . . . . . . . . . . . . 170
Dell EMC Networking N4000 Series Switch
Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 171
Front Panel
Back Panel
LED Definitions
. . . . . . . . . . . . . . . . . . . . . 171
. . . . . . . . . . . . . . . . . . . . . 175
. . . . . . . . . . . . . . . . . . . 177
Switch MAC Addresses
. . . . . . . . . . . . . . . . . 181
4 Using Dell EMC OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 183
About Dell EMC OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . . . 183
Contents 9
Starting the Application . . . . . . . . . . . . . . . . 184
Understanding the Interface
. . . . . . . . . . . . . . 185
Using the Switch Administrator Buttons and
. . . . . . . . . . . . . . . . . . . . . . . . . . 187
Links
Defining Fields . . . . . . . . . . . . . . . . . . . . . 188
Understanding the Device View
Using the Device View Port Features
. . . . . . . . . . . . 188
. . . . . . . 188
Using the Device View Switch Locator
Feature . . . . . . . . . . . . . . . . . . . . . . 189
5 Using the Command-Line Interface . . . . 191
Accessing the Switch Through the CLI . . . . . . . . 191
Console Connection
Telnet Connection. . . . . . . . . . . . . . . . . 192
Understanding Command Modes . . . . . . . . . . . 193
Entering CLI Commands
Using the Question Mark to Get Help
Using Command Completion
Entering Abbreviated Commands. . . . . . . . . 196
Negating Commands
Command Output Paging
Understanding Error Messages . . . . . . . . . 197
Recalling Commands from the History
Buffer
. . . . . . . . . . . . . . . . . . . . . . . 197
. . . . . . . . . . . . . . . . 191
. . . . . . . . . . . . . . . . 195
. . . . . . . 195
. . . . . . . . . . . 196
. . . . . . . . . . . . . . . 196
. . . . . . . . . . . . . 196
10 Contents
6 Default Settings. . . . . . . . . . . . . . . . . . . 199
7 Setting the IP Address and Other
Basic Network Information
IP Address and Network Information Overview . . . . 203
What Is the Basic Network Information?
Why Is Basic Network Information Needed?
How Is Basic Network Information
Configured? . . . . . . . . . . . . . . . . . . . . . 205
What Is Out-of-Band Management and In-Band
Management? . . . . . . . . . . . . . . . . . . . 205
Default Network Information . . . . . . . . . . . . . . 208
. . . . . . . . . . 203
. . . . . 203
. . . 204
Configuring Basic Network Information (Web)
Out-of-Band Interface
. . . . . . . . . . . . . . . 209
. . . . . 209
IP Interface Configuration (Default VLAN IP
Address) . . . . . . . . . . . . . . . . . . . . . . 210
Route Entry Configuration (Switch Default
Gateway)
. . . . . . . . . . . . . . . . . . . . . . 212
Domain Name Server. . . . . . . . . . . . . . . . 214
Default Domain Name . . . . . . . . . . . . . . . 215
Host Name Mapping
Dynamic Host Name Mapping
. . . . . . . . . . . . . . . . 216
. . . . . . . . . . . 217
Configuring Basic Network Information (CLI). . . . . . 218
Enabling the DHCP Client on the OOB Port
. . . . . 218
Enabling the DHCP Client on the Default
VLAN . . . . . . . . . . . . . . . . . . . . . . . . 218
Managing DHCP Leases
. . . . . . . . . . . . . . 219
Configuring Static Network Information on
the OOB Port . . . . . . . . . . . . . . . . . . . . 220
Configuring Static Network Information on
the Default VLAN
. . . . . . . . . . . . . . . . . . 221
Contents 11
Configuring and Viewing Additional Network
Information . . . . . . . . . . . . . . . . . . . . 222
Basic Network Information Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . 224
Configuring Network Information Using the
OOB Port
. . . . . . . . . . . . . . . . . . . . . 224
Configuring Network Information Using the
Serial Interface
. . . . . . . . . . . . . . . . . . 226
8 Managing QSFP Ports . . . . . . . . . . . . . . 229
9 Stacking . . . . . . . . . . . . . . . . . . . . . . . . . 231
Stacking Overview. . . . . . . . . . . . . . . . . . . 231
Dell EMC Networking N1124-ON/N1148-ON,
N1500, N2000, N2100-ON, N3000, N3100-ON,
and N4000 Stacking Compatibility
How is the Stack Master Selected?
Adding a Switch to the Stack
Removing a Switch from the Stack . . . . . . . . 238
How is the Firmware Updated on the Stack?
What is Stacking Standby?
What is Nonstop Forwarding? . . . . . . . . . . 240
Switch Stack MAC Addressing and Stack
Design Considerations
. . . . . . . . . . . . . . 243
NSF Network Design Considerations. . . . . . . 243
Why is Stacking Needed?
. . . . . . . . 236
. . . . . . . 236
. . . . . . . . . . . 237
. . . 239
. . . . . . . . . . . . 239
. . . . . . . . . . . . 244
12 Contents
Default Stacking Values
. . . . . . . . . . . . . . . . 244
Managing and Monitoring the Stack (Web). . . . . . 246
Unit Configuration
. . . . . . . . . . . . . . . . . 246
Stack Summary . . . . . . . . . . . . . . . . . . 247
Stack Firmware Synchronization
. . . . . . . . . 248
Supported Switches . . . . . . . . . . . . . . . . 249
Stack Port Summary
. . . . . . . . . . . . . . . . 250
Stack Port Counters . . . . . . . . . . . . . . . . 251
Stack Port Diagnostics
NSF Summary
. . . . . . . . . . . . . . . . . . . . 252
. . . . . . . . . . . . . . . 251
Checkpoint Statistics . . . . . . . . . . . . . . . . 253
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 254
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 254
Viewing and Clearing Stacking and NSF
Information
. . . . . . . . . . . . . . . . . . . . . 256
Connecting to the Management Console
from a Stack Member . . . . . . . . . . . . . . . 257
Stacking and NSF Usage Scenarios
Basic Failover
. . . . . . . . . . . . . . . . . . . . 257
Preconfiguring a Stack Member
NSF in the Data Center
NSF and VoIP
. . . . . . . . . . . . . . . . . . . . 262
NSF and DHCP Snooping
. . . . . . . . . . . 257
. . . . . . . . . . 259
. . . . . . . . . . . . . . . 261
. . . . . . . . . . . . . . 263
NSF and the Storage Access Network. . . . . . . 264
NSF and Routed Access . . . . . . . . . . . . . . 266
10 Authentication, Authorization, and
Accounting . . . . . . . . . . . . . . . . . . . . . . 269
AAA Introduction . . . . . . . . . . . . . . . . . . . . 269
Methods
Method Lists
Access Lines
Enabling SSH Access. . . . . . . . . . . . . . . . 273
Access Lines (AAA)
Access Lines (Non-AAA)
. . . . . . . . . . . . . . . . . . . . . . 270
. . . . . . . . . . . . . . . . . . . . 271
. . . . . . . . . . . . . . . . . . . . 272
. . . . . . . . . . . . . . . . 274
. . . . . . . . . . . . . . 274
Contents 13
Authentication . . . . . . . . . . . . . . . . . . . . . 275
Authentication Types
Authentication Manager
. . . . . . . . . . . . . . . 275
. . . . . . . . . . . . . 276
Using RADIUS. . . . . . . . . . . . . . . . . . . 281
Using TACACS+ Servers to Control
Management Access
Authentication Examples
Public Key SSH Authentication Example
Associating a User With an SSH Key
. . . . . . . . . . . . . . . 286
. . . . . . . . . . . . . 288
. . . . . 296
. . . . . . . 304
Authorization
Exec Authorization Capabilities
Authorization Examples
RADIUS Change of Authorization
. . . . . . . . . . . . . . . . . . . . . . 306
. . . . . . . . . . 306
. . . . . . . . . . . . . . 308
. . . . . . . . . 310
TACACS Authorization . . . . . . . . . . . . . . 314
Accounting . . . . . . . . . . . . . . . . . . . . . . . 318
RADIUS Accounting
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . . 320
What is IEEE 802.1X?
. . . . . . . . . . . . . . . 318
. . . . . . . . . . . . . . . 320
What are the 802.1X Port Authentication
Modes? . . . . . . . . . . . . . . . . . . . . . . 321
What is MAC-Based 802.1X Authentication?
. . . 322
What is the Role of 802.1X in VLAN
Assignment? . . . . . . . . . . . . . . . . . . . 323
What is Monitor Mode?
. . . . . . . . . . . . . . 326
How Does the Authentication Server Assign
DiffServ Policy? . . . . . . . . . . . . . . . . . . 327
What is the Internal Authentication Server?
Default 802.1X Values
. . . . . . . . . . . . . . . 328
. . . 328
Configuring IEEE 802.1X (Web) . . . . . . . . . . 329
14 Contents
Captive Portal . . . . . . . . . . . . . . . . . . . . . 354
Captive Portal Overview
. . . . . . . . . . . . . 354
Default Captive Portal Behavior and
Settings . . . . . . . . . . . . . . . . . . . . . . . 362
Configuring Captive Portal (Web)
Configuring Captive Portal (CLI)
. . . . . . . . . 364
. . . . . . . . . . 382
Captive Portal Configuration Example . . . . . . . 388
In Case Of Problems in Captive Portal
Deployment
. . . . . . . . . . . . . . . . . . . . . 392
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 393
System Monitoring Overview . . . . . . . . . . . . . . 393
What System Information Is Monitored?
Why Is System Information Needed? . . . . . . . 394
Where Are Log Messages Sent?
What Are the Severity Levels?
. . . . . . . . . . . 395
What Are the System Startup and Operation
. . . . . . . . . . . . . . . . . . . . . . . . 395
Logs?
What Is the Log Message Format? . . . . . . . . . 396
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 397
. . . . . . 393
. . . . . . . . . . 394
Default Log Settings
. . . . . . . . . . . . . . . . . . . 398
Monitoring System Information and Configuring
Logging (Web)
Device Information
System Health
System Resources
Unit Power Usage History
. . . . . . . . . . . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . . . 401
. . . . . . . . . . . . . . . . . 402
. . . . . . . . . . . . . 403
Integrated Cable Test for Copper Cables. . . . . . 404
Optical Transceiver Diagnostics
Log Global Settings
. . . . . . . . . . . . . . . . . 407
. . . . . . . . . . 405
RAM Log . . . . . . . . . . . . . . . . . . . . . . 408
Log File
. . . . . . . . . . . . . . . . . . . . . . . 409
Contents 15
Syslog Server . . . . . . . . . . . . . . . . . . . 409
Email Alert Global Configuration
. . . . . . . . . 412
Email Alert Mail Server Configuration . . . . . . 412
Email Alert Subject Configuration
Email Alert To Address Configuration
. . . . . . . . 414
. . . . . . 415
Email Alert Statistics . . . . . . . . . . . . . . . 416
Monitoring System Information and Configuring
Logging (CLI)
. . . . . . . . . . . . . . . . . . . . . . 417
Viewing System Information and Enabling
the Locator LED
Running Cable Diagnostics
. . . . . . . . . . . . . . . . . . 417
. . . . . . . . . . . . 417
Configuring Local Logging . . . . . . . . . . . . 419
Configuring Remote Logging . . . . . . . . . . . 420
Configuring Mail Server Settings . . . . . . . . . 421
Configuring Email Alerts for Log Messages . . . 422
12 Managing General System Settings . . . 429
16 Contents
Logging Configuration Examples
Configuring Local and Remote Logging
Configuring Email Alerting
. . . . . . . . . . . 424
. . . . . 424
. . . . . . . . . . . . 426
System Settings Overview . . . . . . . . . . . . . . . 429
Why Does System Information Need to Be
Configured?
. . . . . . . . . . . . . . . . . . . . 431
What Are SDM Templates?. . . . . . . . . . . . 431
Why is the System Time Needed?
How Does SNTP Work?
. . . . . . . . . . . . . . 434
. . . . . . . . 434
What Configuration Is Required for Plug-In
Modules? . . . . . . . . . . . . . . . . . . . . . 435
Default General System Information
. . . . . . . . . 435
Configuring General System Settings (Web) . . . . . 436
System Information . . . . . . . . . . . . . . . . . 436
CLI Banner
SDM Template Preference
Clock
. . . . . . . . . . . . . . . . . . . . . 439
. . . . . . . . . . . . . 440
. . . . . . . . . . . . . . . . . . . . . . . . 441
SNTP Global Settings. . . . . . . . . . . . . . . . 442
SNTP Authentication
SNTP Server
Summer Time Configuration
Time Zone Configuration
Card Configuration
Slot Summary
. . . . . . . . . . . . . . . . 443
. . . . . . . . . . . . . . . . . . . . 445
. . . . . . . . . . . . 448
. . . . . . . . . . . . . . 449
. . . . . . . . . . . . . . . . . 450
. . . . . . . . . . . . . . . . . . . . 451
Supported Cards . . . . . . . . . . . . . . . . . . 452
Power Over Ethernet Global Configuration
Power Over Ethernet Unit Configuration
. . . . . 453
. . . . . . 454
Power Over Ethernet Interface Configuration . . . 455
Configuring System Settings (CLI)
Configuring System Information
Configuring the Banner
Managing the SDM Template
. . . . . . . . . . . . 457
. . . . . . . . . . 457
. . . . . . . . . . . . . . . 458
. . . . . . . . . . . 459
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . . 459
Setting the System Time and Date Manually
Configuring the Expansion Slots (Dell EMC
Networking N3000/N3100-ON/N4000 Series Only)
Viewing Slot Information (Dell EMC Networking
N4000 Series Only) . . . . . . . . . . . . . . . . . 463
Configuring PoE Settings (Dell EMC Networking
N1108P-ON/ N1124P-ON/ N1148P-ON,
N1524P/N1548P, N2024P/N2048P/N2128PX-ON,
N3024P/N3048P/N3132PX-ON Only) . . . . . . . . 463
General System Settings Configuration Examples
Configuring System and Banner Information
Configuring SNTP
Configuring the Time Manually
. . . . . . . . . . . . . . . . . . 468
. . . . . . . . . . . 470
Contents 17
. . . . 461
. 462
. . . 465
. . . 465
13 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
SNMP Overview . . . . . . . . . . . . . . . . . . . . 471
What Is SNMP?
What Are SNMP Traps?
Why Is SNMP Needed?
. . . . . . . . . . . . . . . . . . 471
. . . . . . . . . . . . . 472
. . . . . . . . . . . . . . 473
Default SNMP Values
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings
Access Control Group
. . . . . . . . . . . . . . . . . 473
. . . . . . . . . . . . . . . 475
. . . . . . . . . . . . 475
. . . . . . . . . . . . . . . 476
. . . . . . . . . . . . . . 478
SNMPv3 User Security Model (USM) . . . . . . 480
Communities
Notification Filter
. . . . . . . . . . . . . . . . . . . 483
. . . . . . . . . . . . . . . . . 485
Notification Recipients . . . . . . . . . . . . . . 486
Trap Flags . . . . . . . . . . . . . . . . . . . . . 488
OSPFv2 Trap Flags
OSPFv3 Trap Flags
. . . . . . . . . . . . . . . . 489
. . . . . . . . . . . . . . . . 490
Trap Log. . . . . . . . . . . . . . . . . . . . . . 491
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 493
Configuring the SNMPv3 Engine ID
. . . . . . . . 493
Configuring SNMP Views, Groups, and
Users . . . . . . . . . . . . . . . . . . . . . . . 494
Configuring Communities
. . . . . . . . . . . . . 497
Configuring SNMP Notifications (Traps and
Informs) . . . . . . . . . . . . . . . . . . . . . . 499
18 Contents
SNMP Configuration Examples
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . 503
. . . . . . . . . . . . 502
. . . . . . . . 502
14 Images and File Management . . . . . . . . 507
Image and File Management Overview . . . . . . . . . 507
What Files Can Be Managed?
Why Is File Management Needed?
What Methods Are Supported for File
Management? . . . . . . . . . . . . . . . . . . . 512
What Factors Should Be Considered When
Managing Files?
. . . . . . . . . . . . . . . . . . 513
How Is the Running Configuration Saved? . . . . . 515
N3000 Dual Images. . . . . . . . . . . . . . . . . . . . 516
Access Router/Switch Role
Aggregation Router Role . . . . . . . . . . . . . . 517
Managing Images and Files (Web) . . . . . . . . . . . 518
File System
. . . . . . . . . . . . . . . . . . . . . 518
Active Images . . . . . . . . . . . . . . . . . . . 519
USB Flash Drive. . . . . . . . . . . . . . . . . . . 520
File Download
File Upload
. . . . . . . . . . . . . . . . . . . . 521
. . . . . . . . . . . . . . . . . . . . . 523
Copy Files . . . . . . . . . . . . . . . . . . . . . . 525
. . . . . . . . . . . 507
. . . . . . . . . 509
. . . . . . . . . . . . 516
Managing Images and Files (CLI)
. . . . . . . . . . . . 526
Downloading and Activating a New Image
. . . . . . . . . . . . . . . . . . . . . . . . 527
(TFTP)
Managing Files in Internal Flash . . . . . . . . . . 528
Managing Files on a USB Flash Device . . . . . . 529
Uploading a Configuration File (SCP)
Managing Configuration Scripts (SFTP)
. . . . . . . . 530
. . . . . . 531
File and Image Management Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 532
Upgrading the Firmware
. . . . . . . . . . . . . . 532
Managing Configuration Scripts . . . . . . . . . . 535
Contents 19
Managing Files by Using the USB Flash
Drive. . . . . . . . . . . . . . . . . . . . . . . . 537
15 DHCP and USB Auto-Configuration . . . . 539
Auto Configuration Overview . . . . . . . . . . . . . 539
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
Use? . . . . . . . . . . . . . . . . . . . . . . . . 540
How Does USB Auto Configuration Use the
Files on the USB Device?
What Is the Setup File Format? . . . . . . . . . . 543
What Is the DHCP Auto Configuration
Process?
. . . . . . . . . . . . . . . . . . . . . 543
Monitoring and Completing the DHCP Auto
Configuration Process . . . . . . . . . . . . . . 549
What Are the Dependencies for DHCP Auto
Configuration? . . . . . . . . . . . . . . . . . . 550
Default Auto Configuration Values . . . . . . . . . . 551
. . . . . . . . 540
. . . . . . . . . . . . . 541
20 Contents
Managing Auto Configuration (Web)
Auto-Install Configuration
Managing Auto Configuration (CLI)
Managing Auto Configuration
. . . . . . . . . 552
. . . . . . . . . . . . 552
. . . . . . . . . . 553
. . . . . . . . . . 553
Auto Configuration Example . . . . . . . . . . . . . . 554
Enabling USB Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . 554
Enabling DHCP Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . 555
Easy Firmware Upgrade via USB . . . . . . . . . 557
16 Monitoring Switch Traffic . . . . . . . . . . . 559
Traffic Monitoring Overview . . . . . . . . . . . . . . 559
What is sFlow Technology?
What is RMON?
. . . . . . . . . . . . . . . . . . . 562
What is Port Mirroring?
Port Mirroring Behaviors . . . . . . . . . . . . . . 565
RSPAN
. . . . . . . . . . . . . . . . . . . . . . . 567
Remote Capture
. . . . . . . . . . . . . . . . . . . 568
Why is Traffic Monitoring Needed? . . . . . . . . 569
Default Traffic Monitoring Values. . . . . . . . . . . . 569
. . . . . . . . . . . . 559
. . . . . . . . . . . . . . . 563
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration
sFlow Sampler Configuration
sFlow Poll Configuration
. . . . . . . . . . . . 570
. . . . . . . . . . . . . . . 570
. . . . . . . . . . . 571
. . . . . . . . . . . . 572
. . . . . . . . . . . . . . 573
Interface Statistics . . . . . . . . . . . . . . . . . 574
Etherlike Statistics
GVRP Statistics
. . . . . . . . . . . . . . . . . 575
. . . . . . . . . . . . . . . . . . . 576
EAP Statistics. . . . . . . . . . . . . . . . . . . . 577
Utilization Summary
Counter Summary
. . . . . . . . . . . . . . . . 578
. . . . . . . . . . . . . . . . . . 579
Switchport Statistics . . . . . . . . . . . . . . . . 580
RMON Statistics
RMON History Control Statistics
RMON History Table
RMON Event Control
. . . . . . . . . . . . . . . . . . 581
. . . . . . . . . . 582
. . . . . . . . . . . . . . . . 584
. . . . . . . . . . . . . . . . 585
RMON Event Log . . . . . . . . . . . . . . . . . . 587
RMON Alarms
Port Statistics
. . . . . . . . . . . . . . . . . . . 588
. . . . . . . . . . . . . . . . . . . . 590
LAG Statistics. . . . . . . . . . . . . . . . . . . . 591
Port Mirroring
Monitoring Switch Traffic (CLI)
. . . . . . . . . . . . . . . . . . . . 592
. . . . . . . . . . . . . 594
Contents 21
Configuring sFlow. . . . . . . . . . . . . . . . . 594
Configuring RMON
. . . . . . . . . . . . . . . . 596
Viewing Statistics. . . . . . . . . . . . . . . . . 598
Configuring Port Mirroring
Configuring RSPAN
. . . . . . . . . . . . 599
. . . . . . . . . . . . . . . . 600
Traffic Monitoring Examples
Showing Interface Traffic
Configuring sFlow
. . . . . . . . . . . . . 604
. . . . . . . . . . . . . 604
. . . . . . . . . . . . . . . . . 605
Configuring RMON . . . . . . . . . . . . . . . . 607
Configuring Remote Capture . . . . . . . . . . . 608
Configuring RSPAN
. . . . . . . . . . . . . . . . 613
17 iSCSI Optimization . . . . . . . . . . . . . . . . . 617
iSCSI Optimization Overview . . . . . . . . . . . . . 617
What Does iSCSI Optimization Do?
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 618
How Does the Switch Detect iSCSI Traffic
Flows?
. . . . . . . . . . . . . . . . . . . . . . . 618
How Is Quality of Service Applied to iSCSI
Traffic Flows? . . . . . . . . . . . . . . . . . . . 619
How Does iSCSI Optimization Use ACLs?
What Information Does the Switch Track in
iSCSI Traffic Flows?. . . . . . . . . . . . . . . . 620
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?. . . . . . . . . . . . . . 621
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . 621
How Does iSCSI Optimization Interact with
DCBx?
. . . . . . . . . . . . . . . . . . . . . . . 622
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions . . . . . . . 623
. . . . . . . . 618
. . . . 620
22 Contents
Default iSCSI Optimization Values
. . . . . . . . . . 624
Configuring iSCSI Optimization (Web) . . . . . . . . . 625
iSCSI Global Configuration
iSCSI Targets Table
iSCSI Sessions Table
iSCSI Sessions Detailed
. . . . . . . . . . . . . 625
. . . . . . . . . . . . . . . . . 626
. . . . . . . . . . . . . . . . 627
. . . . . . . . . . . . . . 628
Configuring iSCSI Optimization (CLI) . . . . . . . . . . 629
iSCSI Optimization Configuration Examples
. . . . . . 631
Configuring iSCSI Optimization Between
Servers and a Disk Array
. . . . . . . . . . . . . . 631
18 Port Characteristics . . . . . . . . . . . . . . . 635
Port Overview . . . . . . . . . . . . . . . . . . . . . . 635
What Physical Port Characteristics Can Be
Configured?
Auto-Negotiation . . . . . . . . . . . . . . . . . . 637
Maximum Transmission Unit . . . . . . . . . . . . 637
What is Link Dependency? . . . . . . . . . . . . . 638
What Interface Types are Supported?
What is Interface Configuration Mode?
What Are the Green Ethernet Features?
Switchport Modes
Default Port Values
Configuring Port Characteristics (Web)
Port Configuration
Link Dependency Configuration
Link Dependency Summary
Port Green Ethernet Configuration . . . . . . . . . 652
Port Green Ethernet Statistics
Port Green Ethernet LPI History
. . . . . . . . . . . . . . . . . . . . . 635
. . . . . . . 640
. . . . . . 640
. . . . . . 642
. . . . . . . . . . . . . . . . . 643
. . . . . . . . . . . . . . . . . . . 644
. . . . . . . . . 646
. . . . . . . . . . . . . . . . . 646
. . . . . . . . . . 649
. . . . . . . . . . . . 651
. . . . . . . . . . . 653
. . . . . . . . . . 655
Contents 23
Configuring Port Characteristics (CLI). . . . . . . . . 656
Configuring Port Settings
Configuring Link Dependencies
Configuring Green Features
. . . . . . . . . . . . . 656
. . . . . . . . . 658
. . . . . . . . . . . 659
Port Configuration Examples
Configuring Port Settings
Configuring a Link Dependency Groups
Configuring a Port in Access Mode
Configuring a Port in Trunk Mode
Configuring a Port in General Mode
. . . . . . . . . . . . . 660
. . . . . . . . . . . . . 660
. . . . . 661
. . . . . . . 661
. . . . . . . . 662
. . . . . . . 665
19 Port and System Security . . . . . . . . . . . 667
Port-based Security—Port MAC Locking . . . . . . . 667
Denial of Service
. . . . . . . . . . . . . . . . . . . . 674
20 Access Control Lists . . . . . . . . . . . . . . . 675
ACL Overview . . . . . . . . . . . . . . . . . . . . . 675
ACL Counters
What Are MAC ACLs? . . . . . . . . . . . . . . 677
What Are IP ACLs?
ACL Actions
What Is the ACL Redirect Function? . . . . . . . 679
What Is the ACL Mirror Function?
What Is ACL Logging
What Are Time-Based ACLs?. . . . . . . . . . . 680
ACL Limitations
. . . . . . . . . . . . . . . . . . . 677
. . . . . . . . . . . . . . . . 678
. . . . . . . . . . . . . . . . . . . . 678
. . . . . . . . 680
. . . . . . . . . . . . . . . 680
. . . . . . . . . . . . . . . . . . 681
24 Contents
ACL Configuration Details
How Are ACLs Configured?
Editing Access Lists
. . . . . . . . . . . . . . . 686
. . . . . . . . . . . . 686
. . . . . . . . . . . . . . . . 686
Preventing False ACL Matches. . . . . . . . . . . 686
Using IP and MAC Address Masks
. . . . . . . . . 688
Policy-Based Routing
Packet Classification
Route-Map Processing
. . . . . . . . . . . . . . . . . . 689
. . . . . . . . . . . . . . . . 689
. . . . . . . . . . . . . . . 690
Route-Map Actions . . . . . . . . . . . . . . . . . 691
Interface ACLs and PBR Interaction
PBR and Implicit Deny-all
. . . . . . . . . . . . . 694
. . . . . . . . 693
Limitations . . . . . . . . . . . . . . . . . . . . . 694
Configuring ACLs (Web) . . . . . . . . . . . . . . . . . 697
IP ACL Configuration
. . . . . . . . . . . . . . . . 697
IP ACL Rule Configuration . . . . . . . . . . . . . 699
MAC ACL Configuration . . . . . . . . . . . . . . 701
MAC ACL Rule Configuration. . . . . . . . . . . . 703
IPv6 ACL Configuration . . . . . . . . . . . . . . . 704
IPv6 ACL Rule Configuration
ACL Binding Configuration
Time Range Configuration
Configuring ACLs (CLI)
Configuring an IPv4 ACL
Configuring a MAC ACL
Configuring an IPv6 ACL
. . . . . . . . . . . . . . . . . . 710
. . . . . . . . . . . . 705
. . . . . . . . . . . . . 707
. . . . . . . . . . . . . 708
. . . . . . . . . . . . . . 710
. . . . . . . . . . . . . . . 716
. . . . . . . . . . . . . . 720
Configuring a Time Range . . . . . . . . . . . . . 723
ACL Configuration Examples
Basic Rules
. . . . . . . . . . . . . . . . . . . . . 725
Internal System ACLs
. . . . . . . . . . . . . . 725
. . . . . . . . . . . . . . . . 726
Complete ACL Example . . . . . . . . . . . . . . . 727
Advanced Examples . . . . . . . . . . . . . . . . 731
Policy-Based Routing Examples
. . . . . . . . . . 743
Contents 25
21 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 747
VLAN Overview . . . . . . . . . . . . . . . . . . . . 747
VLAN Tagging
GVRP
Double-VLAN Tagging
Voice VLAN . . . . . . . . . . . . . . . . . . . . 753
Private VLANs
Additional VLAN Features
. . . . . . . . . . . . . . . . . . . 750
. . . . . . . . . . . . . . . . . . . . . . . 751
. . . . . . . . . . . . . . 751
. . . . . . . . . . . . . . . . . . . 755
. . . . . . . . . . . . 761
Default VLAN Behavior
Configuring VLANs (Web)
VLAN Membership
VLAN Port Settings
VLAN LAG Settings
Bind MAC to VLAN
Bind IP Subnet to VLAN
GVRP Parameters
Protocol Group
Adding a Protocol Group
Double VLAN Global Configuration
Double VLAN Interface Configuration
Voice VLAN
. . . . . . . . . . . . . . . . 762
. . . . . . . . . . . . . . . 764
. . . . . . . . . . . . . . . . 764
. . . . . . . . . . . . . . . . 769
. . . . . . . . . . . . . . . . 770
. . . . . . . . . . . . . . . . 772
. . . . . . . . . . . . . . 773
. . . . . . . . . . . . . . . . . 774
. . . . . . . . . . . . . . . . . . 776
. . . . . . . . . . . . . 777
. . . . . . . . 779
. . . . . . 780
. . . . . . . . . . . . . . . . . . . . 782
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . 783
Creating a VLAN
. . . . . . . . . . . . . . . . . 783
Configuring VLAN Settings for a LAG. . . . . . . 784
Configuring Double VLAN Tagging . . . . . . . . 785
Configuring MAC-Based VLANs
Configuring IP-Based VLANs
Configuring a Protocol-Based VLAN
Configuring GVRP
. . . . . . . . . . . . . . . . . 795
. . . . . . . . . 788
. . . . . . . . . . . 790
. . . . . . . 792
Configuring Voice VLANs . . . . . . . . . . . . . 797
Configuring a Voice VLAN (Extended
Example)
. . . . . . . . . . . . . . . . . . . . . 799
26 Contents
Enterprise Voice VLAN Configuration With
QoS . . . . . . . . . . . . . . . . . . . . . . . . . 800
MLAG with RPVST and Voice VLAN . . . . . . . . 803
Assigning an 802.1p Priority to VLAN Traffic
Configuring a Private VLAN
. . . . . . . . . . . . 810
. . . . 810
VLAN Configuration Examples
. . . . . . . . . . . . . 813
Configuring VLANs Using the Dell EMC
OpenManage Switch Administrator
. . . . . . . . 813
Configuring VLANs Using the CLI. . . . . . . . . . 821
22 Spanning Tree Protocol . . . . . . . . . . . . 825
STP Overview . . . . . . . . . . . . . . . . . . . . . . 825
What Are Classic STP, Multiple STP, and
Rapid STP?
How Does STP Work?
How Does MSTP Operate in the Network?
MSTP with Multiple Forwarding Paths
MSTP and VLAN IDs
What are the Optional STP Features? . . . . . . . 832
RSTP-PV
DirectLink Rapid Convergence
IndirectLink Rapid Convergence Feature
Interoperability Between STP-PV and
RSTP-PV Modes
Interoperability With IEEE Spanning Tree
Protocols . . . . . . . . . . . . . . . . . . . . . . 839
Configuration Examples
. . . . . . . . . . . . . . . . . . . . . 825
. . . . . . . . . . . . . . . 826
. . . . 827
. . . . . . . 831
. . . . . . . . . . . . . . . . 832
. . . . . . . . . . . . . . . . . . . . . . . . . 834
. . . . . . . . . . . 835
. . . . . 837
. . . . . . . . . . . . . . . . . . 839
. . . . . . . . . . . . . . 844
Default STP Values
. . . . . . . . . . . . . . . . . . . 845
Configuring Spanning Tree (Web)
STP Global Settings
STP Port Settings
. . . . . . . . . . . . . . . . . 846
. . . . . . . . . . . . . . . . . . 848
. . . . . . . . . . . . 846
Contents 27
STP LAG Settings . . . . . . . . . . . . . . . . . 850
Rapid Spanning Tree
MSTP Settings
MSTP Interface Settings
. . . . . . . . . . . . . . . 851
. . . . . . . . . . . . . . . . . . 853
. . . . . . . . . . . . . 855
PVST/RPVST Global Configuration . . . . . . . . 856
PVST/RPVST VLAN Configuration
PVST/RPVST Interface Configuration
. . . . . . . . 857
. . . . . . 859
PVST/RPVST Statistics . . . . . . . . . . . . . . 860
Configuring Spanning Tree (CLI)
Configuring Global STP Bridge Settings
Configuring Optional STP Features
. . . . . . . . . . . . 861
. . . . . 861
. . . . . . . . 862
Configuring STP Interface Settings. . . . . . . . 863
Configuring MSTP Switch Settings
Configuring MSTP Interface Settings
STP Configuration Examples
. . . . . . . . . . . . . . 866
STP Configuration Example
MSTP Configuration Example
. . . . . . . . 864
. . . . . . 865
. . . . . . . . . . . . 866
. . . . . . . . . . . 868
RSTP-PV Access Switch Configuration
Example . . . . . . . . . . . . . . . . . . . . . . 871
23 Discovering Network Devices . . . . . . . . 875
Device Discovery Overview . . . . . . . . . . . . . . 875
What Is ISDP?
What is LLDP?
What is LLDP-MED?
Why are Device Discovery Protocols
Needed?. . . . . . . . . . . . . . . . . . . . . . 876
. . . . . . . . . . . . . . . . . . . 875
. . . . . . . . . . . . . . . . . . . 875
. . . . . . . . . . . . . . . 876
28 Contents
Default IDSP and LLDP Values
. . . . . . . . . . . . . 877
Configuring ISDP and LLDP (Web). . . . . . . . . . . 879
ISDP Global Configuration
. . . . . . . . . . . . 879
ISDP Neighbor Table . . . . . . . . . . . . . . . . 880
ISDP Interface Configuration
ISDP Statistics
LLDP Configuration
. . . . . . . . . . . . . . . . . . . 882
. . . . . . . . . . . . . . . . . 883
. . . . . . . . . . . . 881
LLDP Statistics . . . . . . . . . . . . . . . . . . . 885
LLDP Connections
LLDP-MED Global Configuration
. . . . . . . . . . . . . . . . . 886
. . . . . . . . . . 888
LLDP-MED Interface Configuration . . . . . . . . 889
LLDP-MED Local Device Information
LLDP-MED Remote Device Information
. . . . . . . 890
. . . . . . 890
Configuring ISDP and LLDP (CLI) . . . . . . . . . . . . 891
Configuring Global ISDP Settings
. . . . . . . . . 891
Enabling ISDP on a Port . . . . . . . . . . . . . . 892
Viewing and Clearing ISDP Information . . . . . . 892
Configuring Global LLDP Settings . . . . . . . . . 893
Configuring Port-based LLDP Settings . . . . . . . 893
Viewing and Clearing LLDP Information . . . . . . 894
Configuring LLDP-MED Settings
Viewing LLDP-MED Information
. . . . . . . . . . 895
. . . . . . . . . . 896
Device Discovery Configuration Examples . . . . . . . 896
Configuring ISDP
. . . . . . . . . . . . . . . . . . 896
Configuring LLDP . . . . . . . . . . . . . . . . . . 897
24 Port-Based Traffic Control . . . . . . . . . . 899
Port-Based Traffic Control Overview . . . . . . . . . . 899
What is Flow Control?
What is Storm Control? . . . . . . . . . . . . . . . 900
What are Protected Ports?
What is Error Recovery?
What is Link Local Protocol Filtering? . . . . . . . 902
What is Loop Protection?
. . . . . . . . . . . . . . . 900
. . . . . . . . . . . . . 901
. . . . . . . . . . . . . . 901
. . . . . . . . . . . . . . 903
Contents 29
Default Port-Based Traffic Control Values . . . . . . 904
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
Storm Control
Protected Port Configuration
. . . . . . . . . . . . . . . . . . . 906
. . . . . . . . . . . 908
. . . . 905
. . . . . . 905
LLPF Configuration . . . . . . . . . . . . . . . . 910
Configuring Port-Based Traffic Control (CLI)
Configuring Flow Control and Storm Control
Configuring Protected Ports
. . . . . . . . . . . 913
. . . . . 912
. . . 912
Configuring LLPF . . . . . . . . . . . . . . . . . 914
Port-Based Traffic Control Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 915
25 Layer-2 Multicast Features . . . . . . . . . . 917
L2 Multicast Overview . . . . . . . . . . . . . . . . . 917
Multicast Flooding and Forwarding
What Are the Multicast Bridging Features? . . . 918
What Is L2 Multicast Traffic?
What Is IGMP Snooping?
What Is MLD Snooping?
. . . . . . . . . . . . . 919
. . . . . . . . . . . . . 921
What Is Multicast VLAN Registration?
When Are Layer-3 Multicast Features
Required? . . . . . . . . . . . . . . . . . . . . . 924
What Are GARP and GMRP?
. . . . . . . . 917
. . . . . . . . . . . 919
. . . . . . 923
. . . . . . . . . . . 924
30 Contents
Snooping Switch Restrictions
MAC Address-Based Multicast Group
. . . . . . . . . . . . . 926
. . . . . . 926
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier . . . . . . 926
Using Static Multicast MAC Configuration
IGMP Snooping and GMRP
. . . . . . . . . . . . 926
. . . . 926