Dell N3000, N4000, N2000 User Manual

4 (1)
Dell Networking
N2000, N3000, and N4000
Series Switches
User’s Configuration
Guide
Regulatory Models: N2024, N2024P, N2038,N2048P, N3024, N3024F, N3024P, N3048, N3048P, N4032, N4032F, N4064, N4064F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice. © 2014 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, EqualLogic™, and OpenManage™ are trademarks of Dell Inc. Microsoft are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. sFlow trademark of Cisco Systems. Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
®
®
, Windows®, Windows Server®, MS-DOS®, and Windows Vista®
is a registered trademark of InMon Corporation. Cisco® is a registered
®
and Firefox® are registered trademarks of the Mozilla
Regulatory Models: N2024, N2024P, N2038,N2048P, N3024, N3024F, N3024P, N3048, N3048P, N4032, N4032F, N4064, N406 4F
January 2014 Rev. A01
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 51
About This Document . . . . . . . . . . . . . . . . . . 51
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 52
Document Conventions . . . . . . . . . . . . . . . . . 52
Additional Documentation
. . . . . . . . . . . . . . . . 53
2 Switch Feature Overview . . . . . . . . . . . . 55
System Management Features . . . . . . . . . . . . . 56
Multiple Management Options
System Time Management . . . . . . . . . . . . . 56
Log Messages
. . . . . . . . . . . . . . . . . . . 57
Integrated DHCP Server . . . . . . . . . . . . . . 57
Management of Basic Network Information . . . . 57
IPv6 Management Features
Dual Software Images . . . . . . . . . . . . . . . 58
File Management . . . . . . . . . . . . . . . . . . 58
Switch Database Management Templates
Automatic Installation of Firmware and Configuration
sFlow
. . . . . . . . . . . . . . . . . . . . 59
. . . . . . . . . . . . . . . . . . . . . . . . 59
SNMP Alarms and Trap Logs . . . . . . . . . . . . 60
CDP Interoperability through ISDP . . . . . . . . . 60
Remote Monitoring (RMON)
. . . . . . . . . . . 56
. . . . . . . . . . . . 58
. . . . . 58
. . . . . . . . . . . . 60
Stacking Features
High Stack Count
. . . . . . . . . . . . . . . . . . . . 61
. . . . . . . . . . . . . . . . . . 61
Contents 3
Single IP Management . . . . . . . . . . . . . . . 61
Master Failover with Transparent Transition . . . . 62 Nonstop Forwarding on the Stack . . . . . . . . . 62
Hot Add/Delete and Firmware Synchronization
. . . . . . . . . . . . . . . . . . . 62
Security Features . . . . . . . . . . . . . . . . . . . . 63
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 63
Profiles
Password-Protected Management Access
. . . . 63
Strong Password Enforcement . . . . . . . . . . . 63
TACACS+ Client . . . . . . . . . . . . . . . . . . . 63
RADIUS Support
. . . . . . . . . . . . . . . . . . 64
SSH/SSL. . . . . . . . . . . . . . . . . . . . . . . 64
Inbound Telnet Control . . . . . . . . . . . . . . . 64
Denial of Service
. . . . . . . . . . . . . . . . . . 64
Port Protection . . . . . . . . . . . . . . . . . . . 64
Captive Portal . . . . . . . . . . . . . . . . . . . . 65
Dot1x Authentication (IEEE 802.1X)
. . . . . . . . . 66
MAC-Based 802.1X Authentication . . . . . . . . . 66
Dot1x Monitor Mode . . . . . . . . . . . . . . . . 66
MAC-Based Port Security
. . . . . . . . . . . . . 66
Access Control Lists (ACL) . . . . . . . . . . . . . 67
Time-Based ACLs . . . . . . . . . . . . . . . . . . 67
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 67
DHCP Snooping . . . . . . . . . . . . . . . . . . . 68
Dynamic ARP Inspection
Protected Ports (Private VLAN Edge)
. . . . . . . . . . . . . . 68
. . . . . . . . 68
4 Contents
Green Technology Features
Energy Detect Mode
Energy Efficient Ethernet
. . . . . . . . . . . . . . . 69
. . . . . . . . . . . . . . . . 69
. . . . . . . . . . . . . . 69
Power Utilization Reporting. . . . . . . . . . . . . 69
Power over Ethernet (PoE) Plus Features . . . . . . . . 70
Power Over Ethernet (PoE) Plus Configuration
. . . . . . . . . . . . . . . . . . . . 70
PoE Plus Support . . . . . . . . . . . . . . . . . . 70
Switching Features . . . . . . . . . . . . . . . . . . . 71
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 71
Head of Line Blocking Prevention . . . . . . . . . 71
Alternate Store and Forward (ASF)
. . . . . . . . . 71
Jumbo Frames Support . . . . . . . . . . . . . . . 71
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 72
VLAN-Aware MAC-based Switching
. . . . . . . . 72
Back Pressure Support . . . . . . . . . . . . . . . 72
Auto Negotiation . . . . . . . . . . . . . . . . . . 72
Broadcast Storm Control
. . . . . . . . . . . . . . 73
Port Mirroring. . . . . . . . . . . . . . . . . . . . 73
Static and Dynamic MAC Address Tables . . . . . 73
Link Layer Discovery Protocol (LLDP)
. . . . . . . 74
Link Layer Discovery Protocol (LLDP) for Media Endpoint Devices
. . . . . . . . . . . . . . 74
Connectivity Fault Management (IEEE 802.1ag)
. . . . . . . . . . . . . . . . . . . . 74
Priority-based Flow Control (PFC) . . . . . . . . . 74
Data Center Bridging Exchange (DBCx) Protocol
Enhanced Transmission Selection
Cisco Protocol Filtering
. . . . . . . . . . . . . . . . . . . . . . . 75
. . . . . . . . . 75
. . . . . . . . . . . . . . . 76
DHCP Layer 2 Relay. . . . . . . . . . . . . . . . . 76
Virtual Local Area Network Supported Features . . . . 77
VLAN Support
. . . . . . . . . . . . . . . . . . . . 77
Port-Based VLANs . . . . . . . . . . . . . . . . . 77
IP Subnet-based VLAN . . . . . . . . . . . . . . . 77
MAC-based VLAN
. . . . . . . . . . . . . . . . . 77
IEEE 802.1v Protocol-Based VLANs . . . . . . . . 77
Contents 5
GARP and GVRP Support . . . . . . . . . . . . . . 78
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 78
Guest VLAN . . . . . . . . . . . . . . . . . . . . . 78
Double VLANs
. . . . . . . . . . . . . . . . . . . . 78
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Port Settings
. . . . . . . . . . . . 79
. . . . . . . . . . . 79
. . . . . . . . . . . . 79
Rapid Spanning Tree . . . . . . . . . . . . . . . . 79
Multiple Spanning Tree . . . . . . . . . . . . . . . 79
Bridge Protocol Data Unit (BPDU) Guard BPDU Filtering
RSTP-PV and STP-PV
Link Aggregation Features
Link Aggregation
. . . . . . . . . . . . . . . . . . . 80
. . . . . . . . . . . . . . . . 80
. . . . . . . . . . . . . . . . 81
. . . . . . . . . . . . . . . . . . 81
Link Aggregate Control Protocol (LACP)
. . . . . . 80
. . . . . . 81
Multi-Switch LAG (MLAG) . . . . . . . . . . . . . 81
Routing Features . . . . . . . . . . . . . . . . . . . . . 82
Address Resolution Protocol (ARP) Table Management
. . . . . . . . . . . . . . . . . . . . 82
VLAN Routing . . . . . . . . . . . . . . . . . . . . 82
IP Configuration
. . . . . . . . . . . . . . . . . . . 82
Open Shortest Path First (OSPF) . . . . . . . . . . 82
BOOTP/DHCP Relay Agent IP Helper and UDP Relay
Routing Information Protocol
Router Discovery
. . . . . . . . . . . . . . . . . . 83
. . . . . . . . . . . . . 83
. . . . . . . . . . . . . . 83
. . . . . . . . . . . . 83
Routing Table . . . . . . . . . . . . . . . . . . . . 83
Virtual Router Redundancy Protocol (VRRP) . . . . 84
Tunnel and Loopback Interfaces
. . . . . . . . . . 84
6 Contents
IPv6 Routing Features
IPv6 Configuration
. . . . . . . . . . . . . . . . . . 85
. . . . . . . . . . . . . . . . . 85
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 85
OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . 85
DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 85
Quality of Service (QoS) Features . . . . . . . . . . . . 86
Differentiated Services (DiffServ)
. . . . . . . . . 86
Class Of Service (CoS) . . . . . . . . . . . . . . . 86
Auto Voice over IP (VoIP)
. . . . . . . . . . . . . . 86
Internet Small Computer System Interface (iSCSI) Optimization
. . . . . . . . . . . . . . . . . 87
Layer 2 Multicast Features . . . . . . . . . . . . . . . 87
MAC Multicast Support
. . . . . . . . . . . . . . . 87
IGMP Snooping . . . . . . . . . . . . . . . . . . . 87
IGMP Snooping Querier
. . . . . . . . . . . . . . 88
MLD Snooping . . . . . . . . . . . . . . . . . . . 88
Multicast VLAN Registration . . . . . . . . . . . . 88
Layer 3 Multicast Features . . . . . . . . . . . . . . . 89
Distance Vector Multicast Routing Protocol
. . . . 89
Internet Group Management Protocol . . . . . . . 89
IGMP Proxy
. . . . . . . . . . . . . . . . . . . . . 89
Protocol Independent Multicast— Dense Mode
. . . . . . . . . . . . . . . . . . . . 89
Protocol Independent Multicast— Sparse Mode
. . . . . . . . . . . . . . . . . . . . 90
Protocol Independent Multicast— Source Specific Multicast
. . . . . . . . . . . . . 90
Protocol Independent Multicast IPv6 Support . . . 90
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . . 90
3 Hardware Overview. . . . . . . . . . . . . . . . . 91
Dell Networking N2000 Series Switch Hardware . . . 91
N2000 Series Front Panel
. . . . . . . . . . . . . . 91
Contents 7
N2000 Series Back Panel . . . . . . . . . . . . . . 95
N2000 LED Definitions. . . . . . . . . . . . . . . . 97 Power Consumption for N2000 Series PoE
Switches
. . . . . . . . . . . . . . . . . . . . . 100
Dell Networking N3000 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 102
N3000 Series Front Panel
. . . . . . . . . . . . . 102
N3000 Series Back Panel . . . . . . . . . . . . . 106
LED Definitions
. . . . . . . . . . . . . . . . . . 109
Power Consumption for N3000 Series PoE Switches
. . . . . . . . . . . . . . . . . . . . . 113
Dell Networking N4000 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 115
Front Panel
. . . . . . . . . . . . . . . . . . . . 115
N4000 Back Panel . . . . . . . . . . . . . . . . . 119
LED Definitions . . . . . . . . . . . . . . . . . . 121
Switch MAC Addresses . . . . . . . . . . . . . . . . 125
4 Using Dell OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 127
8 Contents
About Dell OpenManage Switch Administrator. . . . 127
Starting the Application . . . . . . . . . . . . . . . . 128
Understanding the Interface
. . . . . . . . . . . . . . 129
Using the Switch Administrator Buttons and
. . . . . . . . . . . . . . . . . . . . . . . . . . 131
Links
Defining Fields . . . . . . . . . . . . . . . . . . . . . 132
Understanding the Device View . . . . . . . . . . . . 132
Using the Device View Port Features
. . . . . . . 132
Using the Device View Switch Locator
. . . . . . . . . . . . . . . . . . . . . . . 133
Feature
5 Using the Command-Line Interface. . . . 135
Accessing the Switch Through the CLI . . . . . . . . . 135
Console Connection
Telnet Connection . . . . . . . . . . . . . . . . . 136
Understanding Command Modes . . . . . . . . . . . . 137
. . . . . . . . . . . . . . . . 135
Entering CLI Commands
Using the Question Mark to Get Help
Using Command Completion
. . . . . . . . . . . . . . . . . 139
. . . . . . . 139
. . . . . . . . . . . . 140
Entering Abbreviated Commands . . . . . . . . . 140
Negating Commands . . . . . . . . . . . . . . . . 140
Command Output Paging
. . . . . . . . . . . . . . 141
Understanding Error Messages . . . . . . . . . . 141
Recalling Commands from the History Buffer . . . 141
. . . . . . . . . . . . . . . . . . . . . . . . . . . 142
6 Default Settings. . . . . . . . . . . . . . . . . . . 143
7 Setting the IP Address and Other
Basic Network Information
IP Address and Network Information Overview . . . . 147
What Is the Basic Network Information?
Why Is Basic Network Information Needed?
How Is Basic Network Information Configured?
. . . . . . . . . . . . . . . . . . . . . . 148
. . . . . . . . . . . . . . . . . . . . . 149
. . . . . . . . . . 147
. . . . . 147
Contents 9
What Is Out-of-Band Management and In-Band Management?
. . . . . . . . . . . . . . 149
Default Network Information . . . . . . . . . . . . . 151
Configuring Basic Network Information (Web)
Out-of-Band Interface
. . . . . . . . . . . . . . 152
. . . . 152
IP Interface Configuration (Default VLAN IP Address)
. . . . . . . . . . . . . . . . . . . . . . 153
Route Entry Configuration (Switch Default Gateway)
. . . . . . . . . . . . . . . . . . . . . 155
Domain Name Server . . . . . . . . . . . . . . . 157 Default Domain Name . . . . . . . . . . . . . . 158 Host Name Mapping
. . . . . . . . . . . . . . . 159
Dynamic Host Name Mapping . . . . . . . . . . 160
Configuring Basic Network Information (CLI). . . . . 161
Enabling the DHCP Client on the OOB Port
. . . . 161
Enabling the DHCP Client on the Default
. . . . . . . . . . . . . . . . . . . . . . . 161
VLAN
Managing DHCP Leases
. . . . . . . . . . . . . 162
Configuring Static Network Information on the OOB Port
. . . . . . . . . . . . . . . . . . . 163
Configuring Static Network Information on the Default VLAN
. . . . . . . . . . . . . . . . . 163
Configuring and Viewing Additional Network Information
. . . . . . . . . . . . . . . . . . . . 164
10 Contents
Basic Network Information Configuration Example
. . . . . . . . . . . . . . . . . . . . . . . . . 166
8 Managing QSFP Ports . . . . . . . . . . . . . . 169
9 Managing a Switch Stack . . . . . . . . . . . 171
Stacking Overview . . . . . . . . . . . . . . . . . . . 171
Dell Networking N2000, N3000, and N4000 Stacking Compatibility
How is the Stack Master Selected? . . . . . . . . 175
Adding a Switch to the Stack
Removing a Switch from the Stack. . . . . . . . . 177
How is the Firmware Updated on the Stack? . . . 177
What is Stacking Standby?
What is Nonstop Forwarding? . . . . . . . . . . . 178
Switch Stack MAC Addressing and Stack Design Considerations
NSF Network Design Considerations . . . . . . . 181
Why is Stacking Needed? . . . . . . . . . . . . . 182
. . . . . . . . . . . . . . . 174
. . . . . . . . . . . . 176
. . . . . . . . . . . . . 178
. . . . . . . . . . . . . . . 181
Default Stacking Values . . . . . . . . . . . . . . . . . 182
Managing and Monitoring the Stack (Web). . . . . . . 184
Unit Configuration
. . . . . . . . . . . . . . . . . 184
Stack Summary . . . . . . . . . . . . . . . . . . . 185
Stack Firmware Synchronization . . . . . . . . . . 186
Supported Switches
. . . . . . . . . . . . . . . . 187
Stack Port Summary . . . . . . . . . . . . . . . . 188
Stack Port Counters . . . . . . . . . . . . . . . . 189
Stack Port Diagnostics
. . . . . . . . . . . . . . . 189
NSF Summary. . . . . . . . . . . . . . . . . . . . 190
Checkpoint Statistics . . . . . . . . . . . . . . . . 191
Contents 11
Managing the Stack (CLI) . . . . . . . . . . . . . . . 192
Configuring Stack Member, Stack Port, and NSF Settings
. . . . . . . . . . . . . . . . . . . 192
Viewing and Clearing Stacking and NSF Information
. . . . . . . . . . . . . . . . . . . . 194
Stacking and NSF Usage Scenarios
Basic Failover
. . . . . . . . . . . . . . . . . . . 195
Preconfiguring a Stack Member
. . . . . . . . . . 195
. . . . . . . . . 197
NSF in the Data Center . . . . . . . . . . . . . . 199 NSF and VoIP . . . . . . . . . . . . . . . . . . . 200 NSF and DHCP Snooping
. . . . . . . . . . . . . 201
NSF and the Storage Access Network . . . . . . 202
NSF and Routed Access . . . . . . . . . . . . . 204
10 Configuring Authentication,
Authorization, and Accounting . . . . . . . 207
AAA Overview . . . . . . . . . . . . . . . . . . . . . 207
Methods
Access Lines
Authentication
Authentication Types
Authorization . . . . . . . . . . . . . . . . . . . . . . 212
Exec Authorization Capabilities
. . . . . . . . . . . . . . . . . . . . . . 208
. . . . . . . . . . . . . . . . . . . 209
. . . . . . . . . . . . . . . . . . . . . 211
. . . . . . . . . . . . . . . 211
. . . . . . . . . . 212
12 Contents
Accounting . . . . . . . . . . . . . . . . . . . . . . . 214
Authentication Examples
Local Authentication Example
TACACS+ Authentication Example Public Key SSH Authentication Example
RADIUS Authentication Example
. . . . . . . . . . . . . . . 215
. . . . . . . . . . 215
. . . . . . . . 217
. . . . . 218
. . . . . . . . . 225
Authorization Examples . . . . . . . . . . . . . . . . . 227
Local Authorization Example—Direct Login to Privileged EXEC Mode
. . . . . . . . . . . 227
TACACS+ Authorization Example—Direct Login to Privileged EXEC Mode
. . . . . . . . . . . 227
TACACS+ Authorization Example— Administrative Profiles
. . . . . . . . . . . . . . . 228
TACACS+ Authorization Example—Custom Administrative Profile
. . . . . . . . . . . . . . . . 229
TACACS+ Authorization Example— Per-command Authorization
. . . . . . . . . . . . 230
RADIUS Authorization Example—Direct Login to Privileged EXEC Mode
. . . . . . . . . . . 231
RADIUS Authorization Example— Administrative Profiles
. . . . . . . . . . . . . . . 232
Using RADIUS Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . . 232
Access
How Does RADIUS Control Management Access?
. . . . . . . . . . . . . . . . . . . . . . . 232
Which RADIUS Attributes Does the Switch Support?
. . . . . . . . . . . . . . . . . . . . . . 234
How Are RADIUS Attributes Processed on the Switch?
. . . . . . . . . . . . . . . . . . . . . 236
Using TACACS+ Servers to Control Management Access
. . . . . . . . . . . . . . . . . . . . . . . . . . 237
Which TACACS+ Attributes Does the Switch Support?
. . . . . . . . . . . . . . . . . . . . . . 238
Default Configurations . . . . . . . . . . . . . . . . . . 239
Method Lists
. . . . . . . . . . . . . . . . . . . . 239
Access Lines (AAA) . . . . . . . . . . . . . . . . 239
Access Lines (Non-AAA) . . . . . . . . . . . . . . 240
Administrative Profiles
. . . . . . . . . . . . . . . 240
Contents 13
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 243
System Monitoring Overview . . . . . . . . . . . . . 243
What System Information Is Monitored?
Why Is System Information Needed?. . . . . . . 244
Where Are Log Messages Sent? . . . . . . . . . 244
What Are the Severity Levels?
. . . . . . . . . . 245
What Are the System Startup and Operation Logs?
. . . . . . . . . . . . . . . . . . . . . . . 245
What Is the Log Message Format? . . . . . . . . 246
What Factors Should Be Considered When Configuring Logging?
. . . . . . . . . . . . . . . 247
. . . . . 243
Default Log Settings
. . . . . . . . . . . . . . . . . . 248
Monitoring System Information and Configuring Logging (Web)
Device Information
System Health System Resources
. . . . . . . . . . . . . . . . . . . . . 249
. . . . . . . . . . . . . . . . 249
. . . . . . . . . . . . . . . . . . . 251
. . . . . . . . . . . . . . . . 252
Unit Power Usage History . . . . . . . . . . . . 253 Integrated Cable Test for Copper Cables . . . . . 254 Optical Transceiver Diagnostics
Log Global Settings
. . . . . . . . . . . . . . . . 257
. . . . . . . . . 255
RAM Log . . . . . . . . . . . . . . . . . . . . . 258
. . . . . . . . . . . . . . . . . . . . . . 259
Log File Syslog Server
. . . . . . . . . . . . . . . . . . . 259
Email Alert Global Configuration . . . . . . . . . 262
Email Alert Mail Server Configuration
. . . . . . 262
Email Alert Subject Configuration . . . . . . . . 264
Email Alert To Address Configuration. . . . . . . 265
Email Alert Statistics
. . . . . . . . . . . . . . . 266
14 Contents
Monitoring System Information and Configuring Logging (CLI)
. . . . . . . . . . . . . . . . . . . . . . . 267
Viewing System Information and Enabling the Locator LED
Running Cable Diagnostics
. . . . . . . . . . . . . . . . . . . 267
. . . . . . . . . . . . . 268
Configuring Local Logging . . . . . . . . . . . . . 269 Configuring Remote Logging . . . . . . . . . . . . 270
Configuring Mail Server Settings. . . . . . . . . . 271 Configuring Email Alerts for Log Messages . . . . 272
Logging Configuration Examples
Configuring Local and Remote Logging
Configuring Email Alerting
. . . . . . . . . . . . 274
. . . . . . 274
. . . . . . . . . . . . . 276
12 Managing General System Settings . . . 279
System Settings Overview. . . . . . . . . . . . . . . . 279
Why Does System Information Need to Be Configured? . . . . . . . . . . . . . . . . . . . 281
What Are SDM Templates?. . . . . . . . . . . . . 281
Why is the System Time Needed? . . . . . . . . . 283
How Does SNTP Work?
What Configuration Is Required for Plug-In Modules?
. . . . . . . . . . . . . . . . . . . . . . 284
What Are the Key PoE Plus Features for the N2024P/N2048P and N3024P/N3048P Switches?
. . . . . . . . . . . . . . . . . . . . . . 285
Default General System Information
Configuring General System Settings (Web)
System Information . . . . . . . . . . . . . . . . . 287
CLI Banner
. . . . . . . . . . . . . . . . . . . . . 290
SDM Template Preference Clock . . . . . . . . . . . . . . . . . . . . . . . . 292 SNTP Global Settings . . . . . . . . . . . . . . . . 293
. . . . . . . . . . . . . . 283
. . . . . . . . . . 286
. . . . 287
. . . . . . . . . . . . . 291
Contents 15
SNTP Authentication . . . . . . . . . . . . . . . 294 SNTP Server
Summer Time Configuration Time Zone Configuration
Card Configuration Slot Summary
. . . . . . . . . . . . . . . . . . . 296
. . . . . . . . . . . 299
. . . . . . . . . . . . . 300
. . . . . . . . . . . . . . . . 301
. . . . . . . . . . . . . . . . . . . 302
Supported Cards . . . . . . . . . . . . . . . . . 303 Power Over Ethernet Global Configuration
(N2024P/N2048P and N3024P/N3048P Only)
. . . 304
Power Over Ethernet Interface Configuration (N2024P/N2048P and N3024P/N3048P Only)
. . . 305
Configuring System Settings (CLI) . . . . . . . . . . . 307
Configuring System Information
. . . . . . . . . 307
Configuring the Banner . . . . . . . . . . . . . . 308 Managing the SDM Template. . . . . . . . . . . 309 Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . 309
Setting the System Time and Date Manually . . . 311 Configuring the Expansion Slots (N3000
Series Only)
. . . . . . . . . . . . . . . . . . . . 312
Viewing Slot Information (N4000 Series Only)
. . . . . . . . . . . . . . . . . . . . . . . . 313
Configuring PoE Settings (N2024P/N2048P and N3024P/N3048P Only)
. . . . . . . . . . . . 313
13 Configuring SNMP . . . . . . . . . . . . . . . . . 323
16 Contents
General System Settings Configuration Examples
. . . . . . . . . . . . . . . . . . . . . . . . 315
Configuring System and Banner Information
Configuring SNTP Configuring the Time Manually
. . . . . . . . . . . . . . . . . 319
. . . . . . . . . . 321
. . . 315
SNMP Overview . . . . . . . . . . . . . . . . . . . . 323
What Is SNMP?
. . . . . . . . . . . . . . . . . . 323
What Are SNMP Traps? . . . . . . . . . . . . . . 324
Why Is SNMP Needed? . . . . . . . . . . . . . . 325
Default SNMP Values . . . . . . . . . . . . . . . . . . 325
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings Access Control Group
. . . . . . . . . . . . . . . . 327
. . . . . . . . . . . . . 327
. . . . . . . . . . . . . . . . 328
. . . . . . . . . . . . . . . 330
SNMPv3 User Security Model (USM) . . . . . . . 332 Communities . . . . . . . . . . . . . . . . . . . . 335 Notification Filter
. . . . . . . . . . . . . . . . . . 337
Notification Recipients . . . . . . . . . . . . . . . 338
Trap Flags . . . . . . . . . . . . . . . . . . . . . . 340
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . . 341
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . . 342
Tra p Log . . . . . . . . . . . . . . . . . . . . . . . 343
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . . 345
Configuring the SNMPv3 Engine ID
. . . . . . . . 345
Configuring SNMP Views, Groups, and Users . . . 346
Configuring Communities
. . . . . . . . . . . . . . 349
Configuring SNMP Notifications (Traps and Informs)
. . . . . . . . . . . . . . . . . . . . . . . 351
SNMP Configuration Examples . . . . . . . . . . . . . 354
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . . 355
. . . . . . . . . 354
14 Managing Images and Files . . . . . . . . . 359
Image and File Management Overview . . . . . . . . . 359
What Files Can Be Managed?
Why Is File Management Needed?. . . . . . . . . 361
. . . . . . . . . . . 359
Contents 17
What Methods Are Supported for File Management?
. . . . . . . . . . . . . . . . . . . 363
What Factors Should Be Considered When Managing Files?
. . . . . . . . . . . . . . . . . . 364
How Is the Running Configuration Saved? . . . . 366
Managing Images and Files (Web) . . . . . . . . . . 367
File System
. . . . . . . . . . . . . . . . . . . . 367
Active Images. . . . . . . . . . . . . . . . . . . 368 USB Flash Drive . . . . . . . . . . . . . . . . . . 369 File Download
. . . . . . . . . . . . . . . . . . . 370
File Upload . . . . . . . . . . . . . . . . . . . . 372 Copy Files . . . . . . . . . . . . . . . . . . . . . 374
Managing Images and Files (CLI)
. . . . . . . . . . . 375
Downloading and Activating a New Image (TFTP) . . . . . . . . . . . . . . . . . . . . . . . 375
Managing Files in Internal Flash . . . . . . . . . 377 Managing Files on a USB Flash Device . . . . . 379 Uploading a Configuration File (SCP)
Managing Configuration Scripts (SFTP)
. . . . . . . 379
. . . . . 380
File and Image Management Configuration Examples
. . . . . . . . . . . . . . . . . . . . . . . . 381
Upgrading the Firmware
. . . . . . . . . . . . . 381
Managing Configuration Scripts . . . . . . . . . 384
Managing Files by Using the USB Flash Drive
. . . . . . . . . . . . . . . . . . . . . . . . 386
15 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 389
Auto Configuration Overview . . . . . . . . . . . . . 389
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
. . . . . . . . . . . . . . . . . . . . . . . . 390
Use?
. . . . . . . . 390
18 Contents
How Does USB Auto Configuration Use the Files on the USB Device?
. . . . . . . . . . . . . . 391
What Is the Setup File Format?. . . . . . . . . . . 392
What Is the DHCP Auto Configuration Process?
. . . . . . . . . . . . . . . . . . . . . . 393
Monitoring and Completing the DHCP Auto Configuration Process
. . . . . . . . . . . . . . . 398
What Are the Dependencies for DHCP Auto Configuration?
. . . . . . . . . . . . . . . . . . . 399
Default Auto Configuration Values . . . . . . . . . . . 400
Managing Auto Configuration (Web) . . . . . . . . . . 401
Auto-Install Configuration
. . . . . . . . . . . . . 401
Managing Auto Configuration (CLI)
Managing Auto Configuration
. . . . . . . . . . . 402
. . . . . . . . . . . 402
Auto Configuration Example. . . . . . . . . . . . . . . 403
Enabling USB Auto Configuration and Auto Image Download
. . . . . . . . . . . . . . . . . . 403
Enabling DHCP Auto Configuration and Auto Image Download
. . . . . . . . . . . . . . . . . . 405
Easy Image Upgrade via USB . . . . . . . . . . . 406
16 Monitoring Switch Traffic . . . . . . . . . . . 407
Traffic Monitoring Overview . . . . . . . . . . . . . . 407
What is sFlow Technology?
What is RMON?. . . . . . . . . . . . . . . . . . . 410
What is Port Mirroring?
Port Mirroring Behaviors. . . . . . . . . . . . . . 412
Remote Capture. . . . . . . . . . . . . . . . . . . 413
Why is Traffic Monitoring Needed?
. . . . . . . . . . . . . 407
. . . . . . . . . . . . . . . 411
. . . . . . . . 413
Contents 19
Default Traffic Monitoring Values . . . . . . . . . . . 414
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration sFlow Sampler Configuration
. . . . . . . . . . . 414
. . . . . . . . . . . . . . 414
. . . . . . . . . . 416
. . . . . . . . . . . 417
sFlow Poll Configuration . . . . . . . . . . . . . 418 Interface Statistics . . . . . . . . . . . . . . . . 419 Etherlike Statistics
. . . . . . . . . . . . . . . . 420
GVRP Statistics . . . . . . . . . . . . . . . . . . 421 EAP Statistics . . . . . . . . . . . . . . . . . . . 422 Utilization Summary
. . . . . . . . . . . . . . . . 423
Counter Summary. . . . . . . . . . . . . . . . . 424 Switchport Statistics . . . . . . . . . . . . . . . 425 RMON Statistics
. . . . . . . . . . . . . . . . . 426
RMON History Control Statistics . . . . . . . . . 427
RMON History Table . . . . . . . . . . . . . . . 429 RMON Event Control . . . . . . . . . . . . . . . 430 RMON Event Log . . . . . . . . . . . . . . . . . 432 RMON Alarms
. . . . . . . . . . . . . . . . . . . 433
Port Statistics . . . . . . . . . . . . . . . . . . . 435 LAG Statistics . . . . . . . . . . . . . . . . . . . 436 Port Mirroring
. . . . . . . . . . . . . . . . . . . 437
Monitoring Switch Traffic (CLI) . . . . . . . . . . . . 439
Configuring sFlow
Configuring RMON
Viewing Statistics
. . . . . . . . . . . . . . . . . 439
. . . . . . . . . . . . . . . . 441
. . . . . . . . . . . . . . . . . 443
Configuring Port Mirroring . . . . . . . . . . . . 444 Configuring RSPAN . . . . . . . . . . . . . . . . 445
20 Contents
Traffic Monitoring Configuration Examples
Configuring sFlow
Configuring RMON Configuring Remote Capture
. . . . . . . . . . . . . . . . . 447
. . . . . . . . . . . . . . . . 449
. . . . . . . . . . . 450
. . . . . . 447
Configuring RSPAN . . . . . . . . . . . . . . . . 455
17 Configuring iSCSI Optimization . . . . . . . 459
iSCSI Optimization Overview . . . . . . . . . . . . . . 459
What Does iSCSI Optimization Do? How Does the Switch Detect iSCSI
Traffic Flows?
. . . . . . . . . . . . . . . . . . . . 460
How Is Quality of Service Applied to iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . . . . . 460
How Does iSCSI Optimization Use ACLs? . . . . . 461
What Information Does the Switch Track in iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . . 462
How Does iSCSI Optimization Interact With Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 463
What Occurs When iSCSI Optimization Is Enabled or Disabled?
. . . . . . . . . . . . . . . . 463
How Does iSCSI Optimization Interact with
. . . . . . . . . . . . . . . . . . . . . . . . 464
DCBx?
How Does iSCSI Optimization Interact with Dell Compellent Arrays?
. . . . . . . . . . . . . . 464
iSCSI CoS and Priority Flow Control/Enhanced Transmission Selection Interactions
. . . . . . . . . 460
. . . . . . . . 465
Default iSCSI Optimization Values
. . . . . . . . . . . 466
Configuring iSCSI Optimization (Web) . . . . . . . . . 467
iSCSI Global Configuration
. . . . . . . . . . . . . 467
iSCSI Targets Table . . . . . . . . . . . . . . . . . 468 iSCSI Sessions Table . . . . . . . . . . . . . . . . 469 iSCSI Sessions Detailed . . . . . . . . . . . . . . 470
Configuring iSCSI Optimization (CLI)
. . . . . . . . . . 471
iSCSI Optimization Configuration Examples . . . . . . 473
Configuring iSCSI Optimization Between Servers and a Disk Array
. . . . . . . . . . . . . . 473
Contents 21
18 Configuring Port Characteristics. . . . . . 477
Port Overview . . . . . . . . . . . . . . . . . . . . . 477
What Physical Port Characteristics Can Be Configured? . . . . . . . . . . . . . . . . . . 477
What is Link Dependency? . . . . . . . . . . . . 479
What Interface Types are Supported? . . . . . . 481 What is Interface Configuration Mode? . . . . . 481
What Are the Green Ethernet Features? . . . . . 483
Default Port Values. . . . . . . . . . . . . . . . . . . 485
Configuring Port Characteristics (Web) . . . . . . . . 486
Port Configuration
Link Dependency Configuration . . . . . . . . . 489
Link Dependency Summary . . . . . . . . . . . . 491
Port Green Ethernet Configuration
Port Green Ethernet Statistics . . . . . . . . . . 493
Port Green Ethernet LPI History . . . . . . . . . 495
Configuring Port Characteristics (CLI). . . . . . . . . 496
Configuring Port Settings
Configuring Link Dependencies . . . . . . . . . 497
Configuring Green Features
. . . . . . . . . . . . . . . . . 486
. . . . . . . . 492
. . . . . . . . . . . . . 496
. . . . . . . . . . . 498
19 Configuring Port and System
Security . . . . . . . . . . . . . . . . . . . . . . . . . 503
22 Contents
Port Configuration Examples
Configuring Port Settings
. . . . . . . . . . . . . 500
. . . . . . . . . . . . . 500
Configuring a Link Dependency Groups
Port-based Security—IEEE 802.1X and Port MAC Locking
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . 503
. . . . . . . . . . . . . . . . . . . . 504
. . . . . 501
Port Security (Port-MAC Locking) . . . . . . . . . 539
Captive Portal
Captive Portal Overview
Default Captive Portal Behavior and Settings Configuring the Captive Portal (Web)
. . . . . . . . . . . . . . . . . . . . . . 543
. . . . . . . . . . . . . . 543
. . . 548
. . . . . . . 550
Configuring Captive Portal (CLI) . . . . . . . . . . 568 Captive Portal Configuration Example . . . . . . . 574
Authentication Manager
Overview
. . . . . . . . . . . . . . . . . . . . . . 578
Authentication Restart
. . . . . . . . . . . . . . . . . 578
. . . . . . . . . . . . . . . 579
802.1X Interaction. . . . . . . . . . . . . . . . . . 579
Authentication Priority . . . . . . . . . . . . . . . 579
Configuration Example—802.1X and MAB
Denial of Service
. . . . . . . . . . . . . . . . . . . . 582
. . . . . 580
20 Configuring Access Control Lists . . . . . 583
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 583
What Are MAC ACLs?
What Are IP ACLs? . . . . . . . . . . . . . . . . . 585
What Is the ACL Redirect Function?
What Is the ACL Mirror Function? . . . . . . . . . 585
What Is ACL Logging
What Are Time-Based ACLs?
What Are the ACL Limitations?. . . . . . . . . . . 587
. . . . . . . . . . . . . . . 584
. . . . . . . . 585
. . . . . . . . . . . . . . . . 586
. . . . . . . . . . . . 586
ACL Configuration Details . . . . . . . . . . . . . . . . 591
How Are ACLs Configured?
. . . . . . . . . . . . . 591
Editing Access Lists . . . . . . . . . . . . . . . . 591
Preventing False ACL Matches. . . . . . . . . . . 591
Using IP and MAC Address Masks
. . . . . . . . . 593
Contents 23
Policy Based Routing . . . . . . . . . . . . . . . . . 594
Overview
. . . . . . . . . . . . . . . . . . . . . 594
Limitations. . . . . . . . . . . . . . . . . . . . . 596
Examples . . . . . . . . . . . . . . . . . . . . . 598
Configuring ACLs (Web) . . . . . . . . . . . . . . . . 599
IP ACL Configuration
. . . . . . . . . . . . . . . 599
IP ACL Rule Configuration . . . . . . . . . . . . 601 MAC ACL Configuration. . . . . . . . . . . . . . 603
MAC ACL Rule Configuration . . . . . . . . . . . 605 IPv6 ACL Configuration . . . . . . . . . . . . . . 606 IPv6 ACL Rule Configuration . . . . . . . . . . . 607
ACL Binding Configuration . . . . . . . . . . . . 609 Time Range Entry Configuration . . . . . . . . . 610
21 Configuring VLANs. . . . . . . . . . . . . . . . . 645
24 Contents
Configuring ACLs (CLI)
Configuring an IPv4 ACL
Configuring a MAC ACL Configuring an IPv6 ACL
. . . . . . . . . . . . . . . . . 612
. . . . . . . . . . . . . 612
. . . . . . . . . . . . . . 618
. . . . . . . . . . . . . 623
Configuring a Time Range. . . . . . . . . . . . . 626
ACL Configuration Examples. . . . . . . . . . . . . . 628
Basic Rules
. . . . . . . . . . . . . . . . . . . . 628
Internal System ACLs . . . . . . . . . . . . . . . 629
Complete ACL Example . . . . . . . . . . . . . . 629
Advanced Examples
. . . . . . . . . . . . . . . 633
Policy Based Routing Examples . . . . . . . . . 640
VLAN Overview . . . . . . . . . . . . . . . . . . . . 645
Switchport Modes
. . . . . . . . . . . . . . . . 648
VLAN Tagging . . . . . . . . . . . . . . . . . . . 649
GVRP . . . . . . . . . . . . . . . . . . . . . . . 650
Double-VLAN Tagging . . . . . . . . . . . . . . . 651
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 652
Private VLANs . . . . . . . . . . . . . . . . . . . 654
Additional VLAN Features
. . . . . . . . . . . . . 660
Default VLAN Behavior
. . . . . . . . . . . . . . . . . 661
Configuring VLANs (Web) . . . . . . . . . . . . . . . . 663
VLAN Membership
. . . . . . . . . . . . . . . . . 663
VLAN Port Settings . . . . . . . . . . . . . . . . . 668 VLAN LAG Settings . . . . . . . . . . . . . . . . . 669
Bind MAC to VLAN . . . . . . . . . . . . . . . . . 671 Bind IP Subnet to VLAN . . . . . . . . . . . . . . 672
GVRP Parameters. . . . . . . . . . . . . . . . . . 673 Protocol Group . . . . . . . . . . . . . . . . . . . 675
Adding a Protocol Group . . . . . . . . . . . . . . 676
Double VLAN Global Configuration Double VLAN Interface Configuration
. . . . . . . . . 678
. . . . . . . 679
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 681
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . . 682
Creating a VLAN
. . . . . . . . . . . . . . . . . . 682
Configuring a Port in Access Mode . . . . . . . . 682
Configuring a Port in Trunk Mode . . . . . . . . . 683
Configuring a Port in General Mode Configuring VLAN Settings for a LAG
. . . . . . . . 686
. . . . . . . 688
Configuring Double VLAN Tagging . . . . . . . . . 689 Configuring MAC-Based VLANs . . . . . . . . . . 691 Configuring IP-Based VLANs
. . . . . . . . . . . . 692
Configuring a Protocol-Based VLAN . . . . . . . . 693 Configuring GVRP. . . . . . . . . . . . . . . . . . 695 Configuring Voice VLANs
. . . . . . . . . . . . . . 697
VLAN Configuration Examples . . . . . . . . . . . . . 698
Configuring VLANs Using Dell OpenManage Administrator
. . . . . . . . . . . . . . . . . . . . 701
Contents 25
Configure the VLANs and Ports on Switch 2 . . . 705
Configuring VLANs Using the CLI . . . . . . . . . 706
Configuring a Voice VLAN . . . . . . . . . . . . 710
22 Configuring the Spanning Tree
Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 715
STP Overview . . . . . . . . . . . . . . . . . . . . . 715
What Are Classic STP, Multiple STP, and Rapid STP? . . . . . . . . . . . . . . . . . . . . 715
How Does STP Work?. . . . . . . . . . . . . . . 716
How Does MSTP Operate in the Network? . . . . 717 MSTP with Multiple Forwarding Paths . . . . . . 721 What are the Optional STP Features? . . . . . . 722
26 Contents
RSTP-PV
. . . . . . . . . . . . . . . . . . . . . . . . 724
DirectLink Rapid Convergence
IndirectLink Rapid Convergence Feature
. . . . . . . . . . 725
. . . . . 727
Interoperability Between STP-PV and RSTP-PV Modes
. . . . . . . . . . . . . . . . . 729
Interoperability With IEEE Spanning Tree Protocols
Configuration Examples
Default STP Values
. . . . . . . . . . . . . . . . . . . . . 729
. . . . . . . . . . . . . . 734
. . . . . . . . . . . . . . . . . . . 735
Configuring Spanning Tree (Web) . . . . . . . . . . . 736
STP Global Settings
. . . . . . . . . . . . . . . . 736
STP Port Settings . . . . . . . . . . . . . . . . . 738 STP LAG Settings . . . . . . . . . . . . . . . . . 740 Rapid Spanning Tree . . . . . . . . . . . . . . . 741
MSTP Settings . . . . . . . . . . . . . . . . . . 743 MSTP Interface Settings . . . . . . . . . . . . . 745
Configuring Spanning Tree (CLI). . . . . . . . . . . . . 746
Configuring Global STP Bridge Settings
. . . . . . 746
Configuring Optional STP Features . . . . . . . . . 747
Configuring STP Interface Settings . . . . . . . . 748
Configuring MSTP Switch Settings Configuring MSTP Interface Settings
. . . . . . . . . 749
. . . . . . . 750
STP Configuration Examples . . . . . . . . . . . . . . 751
STP Configuration Example
. . . . . . . . . . . . . 751
MSTP Configuration Example . . . . . . . . . . . 753
RSTP-PV Access Switch Configuration Example
. . . . . . . . . . . . . . . . . . . . . . . 756
23 Discovering Network Devices . . . . . . . . 761
Device Discovery Overview . . . . . . . . . . . . . . . 761
What Is ISDP?
What is LLDP? . . . . . . . . . . . . . . . . . . . 761
What is LLDP-MED? . . . . . . . . . . . . . . . . 762
Why are Device Discovery Protocols Needed?
. . . . . . . . . . . . . . . . . . . 761
. . . . . . . . . . . . . . . . . . . . . . 762
Default IDSP and LLDP Values . . . . . . . . . . . . . 763
Configuring ISDP and LLDP (Web)
ISDP Global Configuration
ISDP Cache Table
. . . . . . . . . . . . . . . . . . 766
. . . . . . . . . . . . 765
. . . . . . . . . . . . . 765
ISDP Interface Configuration. . . . . . . . . . . . 767 ISDP Statistics . . . . . . . . . . . . . . . . . . . 768 LLDP Configuration
. . . . . . . . . . . . . . . . . 769
LLDP Statistics . . . . . . . . . . . . . . . . . . . 771 LLDP Connections . . . . . . . . . . . . . . . . . 772 LLDP-MED Global Configuration
. . . . . . . . . . 774
LLDP-MED Interface Configuration . . . . . . . . 775 LLDP-MED Local Device Information . . . . . . . 776
Contents 27
LLDP-MED Remote Device Information . . . . . 776
Configuring ISDP and LLDP (CLI)
Configuring Global ISDP Settings
Enabling ISDP on a Port Viewing and Clearing ISDP Information
Configuring Global LLDP Settings Configuring Port-based LLDP Settings
Viewing and Clearing LLDP Information
. . . . . . . . . . . 777
. . . . . . . . . 777
. . . . . . . . . . . . . 778
. . . . . 778
. . . . . . . . . 779
. . . . . . 779
. . . . . 780
Configuring LLDP-MED Settings . . . . . . . . . 781 Viewing LLDP-MED Information . . . . . . . . . 782
Device Discovery Configuration Examples
Configuring ISDP
Configuring LLDP
. . . . . . . . . . . . . . . . . 782
. . . . . . . . . . . . . . . . . 783
. . . . . . 782
24 Configuring Port-Based Traffic
Control . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Port-Based Traffic Control Overview . . . . . . . . . 787
What is Flow Control?
What is Storm Control? . . . . . . . . . . . . . . 788
What are Protected Ports? . . . . . . . . . . . . 789
What is Link Local Protocol Filtering?
. . . . . . . . . . . . . . . 788
. . . . . . 789
28 Contents
Default Port-Based Traffic Control Values
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
. . . . . . 790
. . . . 791
. . . . . . 791
Storm Control . . . . . . . . . . . . . . . . . . . 792 Protected Port Configuration . . . . . . . . . . . 794 LLPF Configuration . . . . . . . . . . . . . . . . 796
Configuring Port-Based Traffic Control (CLI)
. . . . . 798
Configuring Flow Control and Storm Control
. . . 798
Configuring Protected Ports . . . . . . . . . . . . 799
Configuring LLPF . . . . . . . . . . . . . . . . . . 800
Port-Based Traffic Control Configuration Example . . . 801
25 Configuring L2 Multicast Features . . . . 803
L2 Multicast Overview. . . . . . . . . . . . . . . . . . 803
Multicast Flooding and Forwarding
What Are the Multicast Bridging Features?
What Is L2 Multicast Traffic?. . . . . . . . . . . . 804
What Is IGMP Snooping?. . . . . . . . . . . . . . 805
What Is MLD Snooping?
. . . . . . . . . . . . . . 807
What Is Multicast VLAN Registration? . . . . . . . 808
When Are L3 Multicast Features Required? . . . . 809
What Are GARP and GMRP?
. . . . . . . . 803
. . . . 804
. . . . . . . . . . . . 810
Snooping Switch Restrictions
Partial IGMPv3 and MLDv2 Support
MAC Address-Based Multicast Group
. . . . . . . . . . . . . . 812
. . . . . . . . 812
. . . . . . . 812
IGMP/MLD Snooping in a Multicast Router . . . . 812
Topologies Where the Multicast Source Is Not Directly Connected to the Querier
. . . . . . . 813
Using Static Multicast MAC Configuration. . . . . 813
IGMP Snooping and GMRP. . . . . . . . . . . . . 813
Default L2 Multicast Values . . . . . . . . . . . . . . . 814
Configuring L2 Multicast Features (Web) . . . . . . . . 816
Multicast Global Parameters
. . . . . . . . . . . . 816
Bridge Multicast Group . . . . . . . . . . . . . . . 817 MRouter Status. . . . . . . . . . . . . . . . . . . 820 General IGMP Snooping
. . . . . . . . . . . . . . 821
Global Querier Configuration . . . . . . . . . . . . 824 VLAN Querier . . . . . . . . . . . . . . . . . . . . 825
Contents 29
VLAN Querier Status . . . . . . . . . . . . . . . 827 MFDB IGMP Snooping Table
. . . . . . . . . . . 828
MLD Snooping General . . . . . . . . . . . . . . 829 MLD Snooping Global Querier Configuration. . . 831
MLD Snooping VLAN Querier. . . . . . . . . . . 832 MLD Snooping VLAN Querier Status . . . . . . . 834 MFDB MLD Snooping Table
. . . . . . . . . . . 835
MVR Global Configuration . . . . . . . . . . . . 836 MVR Members . . . . . . . . . . . . . . . . . . 837 MVR Interface Configuration
MVR Statistics GARP Timers
. . . . . . . . . . . . . . . . . . 840
. . . . . . . . . . . . . . . . . . . 841
. . . . . . . . . . . 838
GMRP Parameters . . . . . . . . . . . . . . . . 843
MFDB GMRP Table . . . . . . . . . . . . . . . . 845
Configuring L2 Multicast Features (CLI) . . . . . . . . 846
Configuring Layer 2 Multicasting
. . . . . . . . . 846
Configuring IGMP Snooping on VLANs. . . . . . 847
Configuring IGMP Snooping Querier
. . . . . . . 848
Configuring MLD Snooping on VLANs . . . . . . 849
Configuring MLD Snooping Querier . . . . . . . 850
Configuring MVR
. . . . . . . . . . . . . . . . . 851
Configuring GARP Timers and GMRP. . . . . . . 853
26 Configuring Connectivity Fault
Management . . . . . . . . . . . . . . . . . . . . . 859
30 Contents
Case Study on a Real-World Network Topology . . . 854
Multicast Snooping Case Study
. . . . . . . . . 854
Dot1ag Overview. . . . . . . . . . . . . . . . . . . . 859
How Does Dot1ag Work Across a Carrier Network?
. . . . . . . . . . . . . . . . . . . . . 860
What Entities Make Up a Maintenance Domain?
. . . . . . . . . . . . . . . . . . . . . . 861
Loading...
+ 1430 hidden pages