This guide contains the information needed for configuring and maintaining
the Dell™ Networking™ X1000 and X4000 Series devices through the Dell
Networking Administrator.
For explanation of acronyms, refer to the
Glossary
.
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The device functions as an IPv6-compliant host, as well as an IPv4 host (also
known as dual stack). This enables device operation in a pure IPv6 network as
well as in a combined IPv4/IPv6 network.
For more information, see
IPv6 Addressing
.
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused
by traffic competing for the same egress port resources. The switch prevents
HOL blocking by queueing packets, such that packets in the front of a queue
do not block the packets behind if they are to be sent to different ports.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by
occupying the link so that it is unavailable for additional traffic.
For more information, see
Back Pressure
.
Virtual Cable Testing (VCT)
VCT detects and reports copper link cabling faults, such as open cables and
cable shorts.
For more information, see
Diagnostics
.
Auto-Negotiation
Auto-negotiation enables the device to advertise modes of operation. The
auto-negotiation function enables an exchange of information between two
devices that share a point-to-point link segment, and automatically
configures both devices to take maximum advantage of their transmission
capabilities.
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The devices enhance auto-negotiation by providing port advertisement. Port
advertisement enables the system administrator to configure the port speeds
that are advertised.
For more information, see
Guide\Dell_Astute_Features.fm
Network Administration: Port Settings
.
MDI/MDIX Support
Standard wiring for end stations is known as Media-Dependent Interface
(MDI), and standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
If auto-negotiation is enabled, the device automatically detects whether the
cable connected to an RJ-45 port is MDIX (crossed) or MDI (straight). This
enables both types to be used interchangeably.
If auto-negotiation is disabled, only MDI (straight) cables can be used.
For more information, see
MDI/MDIX
.
MAC Address Capacity Support
MAC Address Capacity Support
All SKUs support up to 16K MAC addresses except for the X4012 that
supports 32K addresses. They reserve specific MAC addresses for system use.
For more information, see
Address Tables
.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative
to learning them from incoming frames. These user-defined entries are not
subject to aging and are preserved across reset to reboots.
For more information, see
Address Tables
.
Self-Learning MAC Addresses
The device enables controlled MAC address learning from incoming packets.
The MAC addresses are stored in the Dynamic Address Table.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
MAC addresses from which no traffic is received for a given period, are aged
out. This frees Bridging Table resources for learning new MAC addresses.
For more information, see
Address Tables
.
VLAN-Aware MAC-Based Switching
The device always performs VLAN-aware bridging. VLAN-aware bridges
perform VLAN-based MAC address learning and forwarding. Frames
addressed to a unknown destination MAC address are flooded to all ports of
the relevant VLAN.
This is a standard feature.
MAC Multicast Support
Multicast service is a service that enables one-to-many and many-to-many
communication for information distribution. In Layer 2 Multicast service, a
single frame is addressed to a specific Multicast address, from which copies of
the frame are transmitted to the relevant ports. When Multicast groups are
statically enabled, you can set the destination port of registered groups, as
well as define the behavior of unregistered Multicast frames.
For more information, see
Network Administration: Multicast
.
Layer 2 Features
IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping examines IGMP
frame contents, when they are forwarded by the device from work stations to
an upstream Multicast router. From the frame data, the device identifies work
stations configured for Multicast sessions, and which Multicast routers are
sending Multicast frames. The IGMP Querier simulates the behavior of a
Multicast router. This enables snooping of the Layer 2 Multicast domain even
if there is no Multicast router.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Multicast Listener Discovery (MLD) Snooping performs the function of
IGMP Snooping for IPv6.
For more information, see
MLD Snooping
.
Port and VLAN Mirroring
Port and VLAN mirroring monitors network traffic by forwarding copies of
incoming and outgoing packets from a monitored port to a monitoring port.
Users specify which target port receives copies of all traffic passing through a
specified source port.
For more information, see
Port and VLAN Mirrorings
.
Broadcast Storm Control
Storm Control limits the number of Multicast and Broadcast frames accepted
and forwarded by the device.
When Layer 2 frames are forwarded, Broadcast and Multicast frames are
forwarded to multiple ports on the relevant VLAN and excess Broadcast and
Multicast could degrade network performance and disrupt services.
For more information, see
Storm Control Configuration
.
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single Broadcast
domain. Packets are classified as belonging to a VLAN, based on either the
VLAN tag or on a combination of the ingress port and packet contents.
Packets sharing common attributes can be grouped in the same VLAN.
For more information, see
Network Administration: VLAN
Port-Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs, based on their ingress
port.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
IEEE 802.1Q defines an architecture for virtual, bridged LANs, the services
provided in VLANs, and the protocols and algorithms involved in the
provision of these services.
For more information, see
VLAN Overview
.
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-
compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk
ports. When GVRP is enabled, the device registers and propagates VLAN
membership on all ports that are part of the active underlying Spanning Tree
Protocol topology.
For more information, see
GVRP Parameters
.
Voice VLAN
Voice VLAN enables network administrators to enhance VoIP service by
configuring ports to carry IP voice traffic from IP phones on a specific VLAN.
VoIP traffic has a preconfigured Organizationally Unique Identifiers (OUI)
prefix in the source MAC address. Network administrators can configure
VLANs from which voice IP traffic is forwarded. Non-VoIP traffic is dropped
from the Voice VLAN in Auto-Voice VLAN Secure mode. Voice VLAN also
provides QoS to VoIP, ensuring that the quality of voice does not deteriorate if
the IP traffic is received unevenly.
The default secure mode is supported.
For more information, see
Voice VLAN
.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port
is denied network access via port-based authorization, but the Guest VLAN is
enabled, the port receives limited network access through the Guest VLAN.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The Private VLAN feature provides Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, it creates a point-tomultipoint Broadcast domain. The ports can be located anywhere in the
Layer 2 network.
For more information, see
Private VLAN
.
Multicast TV VLAN
The Multicast TV VLAN feature provides the ability to supply multicast
transmissions to Layer 2-isolated subscribers, without replicating the
multicast transmissions for each subscriber VLAN. The subscribers are the
only receivers of the multicast transmissions.
For more information, see
Multicast TV VLAN
.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning Tree is a standard Layer 2 switch requirement that enables
bridges to automatically prevent and resolve Layer 2 forwarding loops.
Switches exchange configuration messages using specifically-formatted
frames, and selectively enable and disable forwarding on ports.
For more information, see
Rapid Spanning Tree
.
Fast Link
STP can take 30–60 seconds to converge. During this time, STP detects
possible loops, enabling time for status changes to propagate and for relevant
devices to respond. This period of 30-60 seconds is considered too long a
response time for many applications. The Fast Link option bypasses this
delay, and can be used in network topologies where forwarding loops do not
occur, for example, on edge ports connecting to endpoint devices.
For more information on enabling Fast Link for ports and LAGs, see
Spanning Tree
.
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Spanning Tree takes 30–60 seconds for each host to decide whether its ports
are actively forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of
network topologies to enable faster convergence, without creating forwarding
loops.
For more information, see
Rapid Spanning Tree
.
IEEE 802.1s Multiple Spanning Tree
Multiple Spanning Tree (MSTP) operation maps VLANs into MSTP
instances. MSTP provides a different load balancing scenario. Packets from a
VLAN are forwarded based on the MSTP instance to which the VLAN is
mapped. An MSTP region is a group of MSTP bridges under a common
administration. An MSTP region has one or more MSTP instances. A LAN
may consists of one or more connecting MSTP regions.
For more information, see
MSTP Properties
.
STP BPDU Guard
Bridge Protocol Data Unit. (BPDU) Guard is used as a security mechanism,
to protect the network from invalid configurations.
BPDU Guard is usually used either when fast link ports (ports connected to
clients) are enabled or when the STP feature is disabled. When it is enabled
on a port, the port is shut down if a BPDU message is received and an
appropriate SNMP trap is generated.
For more information, see
Spanning Tree Overview
.
Link Aggregation
Up to 12 Link Aggregation Groups (LAGs) may be defined, each with up to
eight member ports. This enables:
•Fault tolerance protection from physical link disruption
•Higher bandwidth connections
•Improved bandwidth granularity
•High bandwidth server connectivity
A LAG is composed of ports with the same speed, set to full-duplex
operation.
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
LACP uses peer exchanges across links to determine, on an ongoing basis, the
aggregation capability of various links, and continuously provides the
maximum level of aggregation capability achievable between a given pair of
devices. LACP automatically determines, configures, binds, and monitors the
port binding within the system.
For more information, see
VLAN LAG Membership
.
DHCP Clients
DHCP enables additional setup parameters to be received from a network
server upon system startup. DHCP service is an on-going process.
For more information, see
IP Addressing Overview
.
Quality of Service Features
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking
and prioritizing network traffic at the data link/MAC sub-layer. 802.1p traffic
is classified and sent to the destination. No bandwidth reservations or limits
are established or enforced. 802.1p is taken from the 802.1Q (VLANs)
standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
For more information about QoS, see
.
Service
Network Administration: Quality of
TCP Congestion Avoidance
The TCP Congestion Avoidance feature activates an algorithm to prevent
TCP global synchronization during congestions. TCP global synchronization
can occur when packets are dropped all at once during congestion. As a result,
it can unexpectedly synchronize multiple TCP hosts to reduce their
transmission during congestion and restart the transmission when the
congestion eases.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The system logs events with severity codes and timestamps. Events are sent as
SNMP traps to a Trap Recipient List.
For more information, see
SNMP Versions 1, 2, and 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol
controls access to the system. A list of community entries is defined, each
consisting of a community string and its access privileges. There are three
levels of SNMP security: read-only, read-write, and super. Only a super user
can access the Community table.
For more information, see
Web-Based Management
Web-based management enables managing the system from any web browser.
The system contains an Embedded Web Server (EWS) that serves HTML
pages, through which the system can be monitored and configured. The
system internally converts web-based input into configuration commands,
MIB variable settings, and other management-related settings.
For more information, see
Network Administration: SNMP Monitoring
Network Administration: SNMP Monitoring
Using the GUI
.
.
.
Management IP Address Conflict Notification
This feature validates the uniqueness of the switch's IP address, whether it is
assigned manually or through DHCP. If the IP address is not unique, the
switch performs actions according to the address type. See
Overview
.
IP Addressing
Configuration File
The device configuration is stored in a configuration file that is stored on the
device. The configuration file includes both system-wide and port-specific
device configuration. The system can display configuration files as a
collection of CLI commands that are stored and manipulated as text files.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
This feature facilitates installation of new devices. When you enable the
various auto-update options, the device automatically downloads a new
image or configuration file. It receives configuration parameters with its IP
address from a DHCP server, after which the device automatically reboots,
using the image or configuration file it received.
For more information, see
Auto-Update
.
TFTP (Trivial File Transfer Protocol)
The device supports boot image, software, and configuration
upload/download via TFTP.
For more information, see
File Update and Backup
.
USB File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via USB.
For more information, see
Update Firmware / Configuration
.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP that provides
comprehensive network traffic monitoring capabilities. RMON is a standard
MIB that defines MAC-layer statistics and control objects, enabling real-time
information to be captured across the entire network.
For more information, see
Monitoring
.
sFlow
The sFlow feature enables collecting statistics using the sFlow sampling
technology, based on sFlow V5.
This feature is supported on the following switch models:
•X1052/P
•X4012
This feature is not supported on the following switch models:
•X1008/P
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Command Line Interface (CLI) is composed of mandatory and optional
elements. The CLI interpreter provides command and keyword completion to
assist users and save typing.
CLI is only available in Managed mode.
For more information, see
Using the CLI
.
SYSLOG
Syslog is a protocol that enables event notifications to be stored locally. You
can configure the switch to send them to a remote SYSLOG server. The
system sends notifications of significant events in real time, and keeps a
record of these events for after-the-fact usage.
For more information on SYSLOG, see
Logs and Alerts
.
SNTP
The Simple Network Time Protocol (SNTP) assures accurate Coordinated
Universal Time (UTC) synchronization up to the millisecond. The time is
synchronized from an SNTP server over a packet-switched network. Time
sources are prioritized by strata. Strata define the distance from the reference
clock. The higher the stratum (where zero is the highest), the more accurate
the clock.
For more information, see
Time Synchronization
.
Domain Name System
Domain Name System (DNS) converts user-defined domain names into IP
addresses. The switch resolves domain names to IP addresses from its local
DNS cache or from a DNS server. For example, www.ipexample.com is
translated into 192.87.56.2. DNS servers maintain domain name databases
containing their corresponding IP addresses.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot, and enhances network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
allows a device to identify itself and advertise its capabilities and device
information to its neighbors.
Identity, capabilities, and device information are sent as Type Length Values
(TLVs) in LLDP packets. LLDP devices must support chassis and port ID
advertisement, as well as system name, system ID, system description, and
system capability advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) is an extension of LLDP. It
increases flexibility in supporting media applications/devices of different
policy and QoS in the same network. With LLDP-MED, media endpoints,
such as IP phones and video camera, can advertise information, such as their
identity, civic locations, Emergency Location Identifier Number (ELIN),
media (voice and video) applications, and network policies to their neighbors.
For more information, see
Protocol (LLDP)
.
Network Administration: Link Layer Discovery
Security Features
Dot1x and MAC based Authentication
Dot1x and MAC based authentication enables authenticating system users
on a per-port or per-device basis. Only users from authenticated ports and
devices are granted network access to transmit and receive data.
Authentication is enforced via the Remote Authentication Dial-In User
Service (RADIUS) server using the Extensible Authentication Protocol
(EAP). Dynamic VLAN Assignment (DVA) enables network administrators to
automatically assign users to VLANs during the RADIUS server
authentication.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Locked Port increases network security by limiting access on a specific port to
users with specific MAC addresses. These addresses are either manually
defined or learned on that port. When a frame is received on a locked port,
and the frame source MAC address is not tied to that port, the protection
mechanism is invoked.
For more information, see
Port Security
.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user
database that contains per-user authentication information, such as user
name, password, and accounting information.
For more information, see
RADIUS
.
RADIUS Accounting
This feature enables recording device management sessions (Telnet, serial,
and WEB but not SNMP) and/or 802.1x authentication sessions.
The 802.1x Monitor mode enables applying 802.1x functionality to the
switch, with all necessary RADIUS and/or domain servers active, without
actually taking any action that may cause unexpected behavior. In this way,
the user can test the 802.1x setup before actually applying it.
For more information, see
RADIUS
.
TACACS+
TACACS+ provides centralized security for validation of users accessing the
device. TACACS+ provides a centralized, user management system, while
still retaining consistency with RADIUS and other authentication processes.
For more information, see
TACACS+
.
Password Management
Password management provides increased network security and improved
password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP
access are assigned security features.
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
The switch provides the ability to demand strong passwords, meaning that
they must contain both upper and lower-case letters, numbers, and special
characters.
For more information, see
Global Password Management
.
Access Control Lists (ACL)
Access Control Lists
rules and actions for specific ingress ports. Packets entering an ingress port
with an active ACL are either admitted or denied entry according to the rules
they match (or not match). An administrator can also configure an ACL rule
to shutdown a port with matching packets.
For more information, see
(ACL) enable network managers to define classification
ACL and ACE
.
Dynamic ACL/Dynamic Policy Assignment (DACL/DPA)
The network administrator can specify the user's ACL in the RADIUS server.
After successful authentication, the user is assigned that ACL.
For more information, see
ACL and ACE
.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers. By enabling DHCP
Snooping, network administrators can differentiate between trusted
interfaces connected to end-users or DHCP servers and untrusted interfaces
located beyond the network firewall.
For more information, see
DHCP Snooping
.
DHCP Relay
The device can act as a DHCP Relay agent that listens for DHCP messages,
and relays them between DHCP servers and clients, which reside in different
VLANs or IP subnets.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Dynamic ARP inspection is a security feature that validates ARP packets in a
network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC
address bindings. This capability protects the network from certain man-inthe-middle attacks.
For more information, see
Dynamic ARP Inspection (DAI)
.
Port Profile
Port profiles provide a convenient way to save and share a common port
configuration. A port profile is a set of CLI commands with a unique name.
When a port profile is applied to a port, the CLI commands contained within
it are executed and added to the Running Configuration file.
For more information, see
Port Profile
.
DHCP Server
Dynamic Host Configuration Protocol (DHCP) provides a means of assigning
IP addresses and passing configuration information (including the IP address
of a TFTP server and a configuration file name) to hosts on a TCP/IP
network. The switch can serve as a DHCP server or client.
For more information on the device serving as a DHCP server, see
Administration: DHCP Server
.
Network
Protected Ports
The Protected Ports feature provides Layer 2 isolation between interfaces
(Ethernet ports and LAGs) that are in the same Broadcast domain (VLAN)
with other interfaces.
For more information, see
Protected Ports
.
Proprietary Protocol Filtering
This feature enables user control over the filtering of packets with proprietary
protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. The user can
select any combination of the protocols to be filtered, for example: CDP and
VTP.
For more information, see
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
30Features
Protocol Group
.
Loading...
+ 386 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.