Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, PowerEdge, PowerConnect, and OpenManage are trademarks of Dell Inc.; Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; sFlow is a
registered trademark of InMon Corporation. Cisco is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the United States and
certain other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Model PC6224, PC6248, PC6224P, PC6248P, and PC6224F
This section describes the switch user-configurable features. For a list of all features, see the software
version release notes.
NOTE: Before proceeding, read the release notes for this product. Release notes are provided with the
firmware available on the Dell Support website, support.dell.com.
The Dell™ PowerConnect™ 6200 series are standalone Layer 2 and 3 switches that extend the Dell
PowerConnect LAN switching product range. These switches include the following features:
•1U form factor, rack-mountable chassis design.
•Support for all data-communication requirements for a multi-layer switch, including layer 2
switching, IPv4 routing, IPv6 routing, IP multicast, quality of service, security, and system
management features.
•High availability with hot swappable stack members.
The Dell PowerConnect 6224 switch supports 24 1000Base-T copper ports and 4 "combo" ports for
RJ-45 or SFP interfaces. The Dell PowerConnect 6224P adds support for power-over-Ethernet (PoE)
capability.
The Dell PowerConnect 6224F switch supports 24 1000Base-FX SFP ports and 4 "combo" ports for
RJ-45 or SFP interfaces.
The Dell PowerConnect 6248 supports 48 1000Base-T copper ports and 4 "combo" ports for RJ-45 or
SFP interfaces. The Dell PowerConnect 6248P adds support for PoE capability.
The topics covered in this section include:
•System Features
•Switching Features
•Routing Features
•IPv6
•Quality of Service Features
•Multicast Features
•Additional Documentation
1
Introduction19
System Features
sFlow
sFlow is the standard for monitoring high-speed switched and routed networks. sFlow Version 5
technology is built into network equipment and gives complete visibility into network activity, enabling
effective management and control of network resources.
CDP Interoperability
Allows the PowerConnect switch to interoperate with Cisco™ devices running CDP.
Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2 network protocol which interoperates with Cisco network equipment and is used to share information between neighboring devices
(routers, bridges, access servers, and switches).
Auto Config
Auto Config is a software feature which provides for the configuration of a switch automatically when
the device is initialized and no configuration file is found on the switch. Auto Config is accomplished in
three phases:
Configuration or assignment of an IP address for the device
1.
2.
Assignment of a TFTP server
3.
Obtaining a configuration file for the device from the TFTP server
Captive Portal
Blocks clients from accessing the network until user verification has been established. Verification can be
configured to allow access for both guest and authenticated users. Authenticated users must be validated
against a database of authorized Captive Portal users before access is granted.
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. The events are sent as SNMP traps to a trap
recipient list.
For information about SNMP Alarms and Traps, see "Defining SNTP Global Parameters."
Web Based Management
You can manage the system from any web browser. The switch contains an embedded web server that
serves HTML pages you can use to monitor and configure the system.
Configuration File Download
The switch’s configuration file includes both system-wide and port-specific device configuration data.
You can display configuration files through command-line interface (CLI) commands.
For information about downloading configuration files, see "Downloading Files."
20Introduction
Software Download
Software download enables storage of backup firmware images. For information about downloading the
software, see "Software Download and Reboot
Trivial File Transfer Protocol (TFTP)
.
"
The PowerConnect 6200 Series switches support boot image, firmware, and configuration upload or
download through TFTP.
Remote Monitoring (RMON)
RMON is a standard Management Information Base (MIB) that defines current and historical MAClayer statistics and control objects, allowing real-time information to be captured across the entire
network.
Simple Network Management Protocol (SNMP) Versions 1, 2, and 3
The system is fully manageable using a combination of MIB variables, whose combined values represent
all facets of the system state, and the SNMP protocol to examine and possibly modify these values.
SNMP v1/v2c/v3 over the UDP/IP transport protocol is supported.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry
practice. CLI is composed of mandatory and optional elements. Context-sensitive help provides format
and value ranges allowed for current commands, and the CLI interpreter provides command and
keyword completion.
Syslog
Syslog is a protocol that allows event notifications to be sent to a set of desired remote servers where they
can be stored, examined, and acted upon.
For information about Syslog, see "Managing Logs."
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network switch clock time synchronization
up to the millisecond. Time synchronization is performed by a network SNTP server.
For more information about SNTP, see "Configuring SNTP Settings."
Real Time Clock
The Real Time Clock feature allows the user to set the time and date for the switch.
For information about Real Time Clock, see "Clock Detail."
Introduction21
Configurable CX-4/Stacking Modules
This feature allows the stacking and CX-4 plug-in modules to be configured to either role (Ethernet or
Stacking). By default, the module will function according to its module ID. Upon changing the role of a
module, a reboot will be required for the change to take effect.
Non-stop Forwarding
This feature enables a stack to continue forwarding packets when the stack management unit fails due to
a power failure, hardware failure, or software fault.
22Introduction
Switching Features
IPv6 Access Control Lists
An IPv6 ACL consists of a set of rules which are matched sequentially against a packet. When a packet
meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken and the additional
rules are not checked for a match.
Access Control List (ACL) Outbound Support
This feature enables binding an ACL (IP, MAC, or IPv6) in outbound direction on physical, LAG, and
VLAN interfaces.
IP Source Guard (IPSG)
IP source guard (IPSG) is a security feature that filters IP packets based on the source ID. The source ID
may either be source IP address or a source IP address source MAC address pair. IPSG is disabled by
default.
DHCP Snooping
DHCP Snooping is a security feature that monitors DHCP messages between a DHCP client and DHCP
server. It filters harmful DHCP messages and builds a bindings database of (MAC address, IP address,
VLAN ID, port) tuples that are specified as authorized. DHCP snooping can be enabled globally and on
specific VLANs. Ports within the VLAN can be configured to be trusted or untrusted. DHCP servers
must be reached through trusted ports.
DHCP L2 Relay
This feature permits L3 Relay agent functionality in L2 switched networks.
Dynamic ARP Inspection
Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The
feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for
other stations by poisoning the ARP caches of its unsuspecting neighbors. The miscreant sends ARP
requests or responses mapping another station's IP address to its own MAC address.
Dynamic ARP Inspection relies on DHCP Snooping.
MLD Snooping
In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of multicast traffic by
dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces
associated with IP multicast address.
In IPv6, MLD snooping performs a similar function. With MLD snooping, IPv6 multicast data is
selectively forwarded to a list of ports intended to receive the data (instead of being flooded to all of the
ports in a VLAN). This list is constructed by snooping IPv6 multicast control packets.
Introduction23
IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping is a feature that allows a switch to forward
multicast traffic intelligently on the switch. Multicast IP traffic is traffic that is destined to a host group.
Host groups are identified by class D IP addresses, which range from 224.0.0.0 to 239.255.255.255. Based
on the IGMP query and report messages, the switch forwards traffic only to the ports that request the
multicast traffic. This prevents the switch from broadcasting the traffic to all ports and possibly affecting
network performance.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing
packets from up to four source ports to a monitoring port.
Broadcast Storm Control
When Layer 2 frames are forwarded, broadcast, unknown unicast, and multicast frames are flooded to all
ports on the relevant virtual local area network (VLAN). The flooding occupies bandwidth, and loads all
nodes connected on all ports. Storm control limits the amount of broadcast, unknown unicast, and
multicast frames accepted and forwarded by the switch.
24Introduction
Port-Based Features
Jumbo Frames Support
Jumbo frames enable transporting data in fewer frames to ensure less overhead, lower processing time,
and fewer interrupts.
Auto-MDI/MDIX Support
The switch supports auto-detection between crossed and straight-through cables.
Media-Dependent Interface (MDI) is the standard wiring for end stations, and the standard wiring for
hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
Auto Negotiation
Auto negotiation allows the switch to advertise modes of operation. The auto negotiation function
provides the means to exchange information between two switches that share a point-to-point link
segment, and to automatically configure both switches to take maximum advantage of their transmission
capabilities.
The PowerConnect 6200 Series enhances auto negotiation by providing port advertisement. Port
advertisement allows the system administrator to configure the port speeds advertised.
For information about auto negotiation, see "Port Configuration" or "LAG Configuration."
Flow Control Support (IEEE 802.3x)
Flow control enables lower speed switches to communicate with higher speed switches by requesting
that the higher speed switch refrains from sending packets. Transmissions are temporarily halted to
prevent buffer overflows.
For information about configuring flow control for ports or LAGs, see "Port Configuration" or "LAG
Configuration."
Head of Line Blocking Prevention
Head of Line (HOL) blocking prevention prevents traffic delays and frame loss caused by traffic
competing for the same egress port resources. HOL blocking queues packets, and the packets at the head
of the queue are forwarded before packets at the end of the queue.
Back Pressure Support
On half-duplex links, a receiver may prevent buffer overflows by occupying the link so that it is
unavailable for additional traffic.
Introduction25
Alternate Store and Forward (ASF)
The Alternate Store and Forward (ASF) feature reduces latency for large packets. When ASF is enabled,
the memory management unit (MMU) can forward a packet to the egress port before it has been entirely
received on the Cell Buffer Pool (CBP) memory. AFS, which is also known as cut-through mode, is
configurable through the command-line interface. For information about how to configure the AFS
feature, see the
CLI Reference Guide
, which is located on the Dell Support website at
www.support.dell.com/manuals.
Link Dependency Features
The link dependency feature provides the ability to enable or disable one or more ports based on the
state of the link of one or more ports.
For information about Link Dependency, see "Creating Link Dependencies."
Virtual Local Area Network Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified
as belonging to a VLAN based on either the VLAN tag or a combination of the ingress port and packet
contents. Packets sharing common attributes can be groups in the same VLAN.
For information about configuring VLANs, see "Configuring VLANs."
Port-Based VLANs
Port-based VLANs classify incoming packets to VLANs based on their ingress port. When a port uses
802.1X port authentication, packets can be assigned to a VLAN based on the result of the 802.1X
authentication a client uses when it accesses the switch. This feature is useful for assigning traffic to
Guest VLANs or Voice VLANs.
For information about configuring VLANs, see "Configuring VLANs."
IEEE 802.1v Protocol-Based VLANs
VLAN classification rules are defined on data-link layer (Layer 2) protocol identification. Protocol-based
VLANs are used for isolating Layer 2 traffic for differing Layer 3 protocols.
For information about defining Protocol-Based VLANs, see "Protocol Group."
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual bridged LANs, the services provided in VLANs, and the
protocols and algorithms involved in the provision of these services.
26Introduction
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-compliant VLAN pruning and
dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the switch registers and
propagates VLAN membership on all ports that are part of the active spanning tree protocol topology.
For information about configuring GVRP, see "GVRP Parameters."
Protected Ports (Private VLAN Edge)
Private VLAN Edge (PVE) ports are a Layer 2 security feature that provides port-based security between
ports that are members of the same VLAN. It is an extension of the common VLAN. Traffic from
protected ports is sent only to the uplink ports and cannot be sent to other ports within the VLAN.
Subnet-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the
source IP address of the packet.
For information about configuring Subnet-based VLANs, see "Bind IP Subnet to VLAN."
MAC-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the
source MAC address of the packet.
For information about configuring MAC-based VLANs, see "Bind MAC to VLAN."
Double VLANs
The Double VLAN feature allows the use of a second tag on network traffic. The additional tag helps
differentiate between customers in the Metropolitan Area Networks (MAN) while preserving individual
customer’s VLAN identification when they enter their own 802.1Q domain.
Protocol-based VLANs
In a protocol-based VLAN, traffic is bridged through specified ports based on the VLAN’s protocol. Userdefined packet filters determine if a particular packet belongs to a particular VLAN. Protocol-based
VLANs are most often used in situations where network segments contain hosts running multiple
protocols.
Introduction27
Spanning Tree Protocol Features
Spanning Tree Now Supports IEEE 802.1Q-2005
This version of the IEEE Multiple Spanning Tree Protocol corrects problems associated with the previous
version, provides for faster transition-to-forwarding, and incorporates new features for a port (restricted
role and restricted TCN).
Spanning Tree Enhancements
•
Loop Guard
forwarding when the port stops receiving BPDUs. The port is marked as being in loop-inconsistent
state. In this state, the port does not forward packets. The possible values are Enable or Disable.
TCN Guard
•
change information received through that port. This means that even if a port receives a BPDU with
the topology change flag set to true, the port will not flush its MAC address table and send out a BPDU
with a topology change flag set to true.
•
Auto Edge
BPDUs for some duration.
•
BPDU Filter
on this port.
BPDU Flood
•
when STP is disabled on this port.
Spanning Tree Protocol (STP) per Switch
802.1d STP is a standard requirement of Layer 2 switches that allows bridges to automatically prevent
and resolve L2 forwarding loops.
For information about configuring Spanning Tree Protocol, see "Configuring the Spanning Tree
Protocol."
— This feature prevents a port from erroneously transitioning from blocking state to
— Enabling the TCN Guard feature restricts the port from propagating any topology
— Enabling the Auto Edge feature allows the port to become an edge port if it does not see
— When enabled, this feature filters the BPDU traffic on this port when STP is enabled
— When enabled, the BPDU Flood feature floods the BPDU traffic arriving on this port
IEEE 802.1w Rapid Spanning Tree
Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies to enable faster spanning tree
convergence after a topology change, without creating forwarding loops.
For information about configuring Rapid Spanning Tree Protocol, see "Rapid Spanning Tree."
Multiple Spanning Tree
Multiple Spanning Tree (MSTP) operation maps VLANs to spanning tree instances. Packets assigned to
various VLANs are transmitted along different paths within MSTP Regions (MST Regions). Regions are
one or more interconnected MSTP bridges with identical MSTP settings. The MSTP standard lets
administrators assign VLAN traffic to unique paths.
For information about configuring Multiple Spanning Tree, see "MSTP Settings."
28Introduction
Spanning Tree Root Guard
Spanning Tree Root Guard is used to prevent the root of a Spanning Tree instance from changing
unexpectedly. The priority of a Bridge ID can be set to zero but another Bridge ID with a lower mac
address could also set its priority to zero and take over root.
Bridge Protocol Data Unit Guard
Spanning Tree BPDU Guard is used to disable the port in case a new device tries to enter the already
existing topology of STP. Thus devices, which were originally not a part of STP, are not allowed to
influence the STP topology.
Link Aggregation Features
Link Aggregation
Up to eight ports can combine to form a single Link Aggregated Group (LAG). This enables fault
tolerance protection from physical link disruption, higher bandwidth connections and improved
bandwidth granularity.
A LAG is composed of ports of the same speed, set to full-duplex operation.
For information about configuring LAGs, see "LAG Configuration."
Link Aggregation and LACP
Link Aggregate Control Protocol (LACP) uses peer exchanges across links to determine, on an ongoing
basis, the aggregation capability of various links, and continuously provides the maximum level of
aggregation capability achievable between a given pair of systems. LACP automatically determines,
configures, binds, and monitors the binding of ports to aggregators within the system.
For information about LACP, see "LACP Parameters."
IP Phone and Access Point Support Features
Power Over Ethernet (PoE) Configuration
The PowerConnect 6200 supports PoE configuration for power threshold, SNMP traps, and PoE legacy
device support.
Link Layer Discovery Protocol (LLDP) for Media Endpoint Devices
The Link Layer Discovery Protocol for Media Endpoint Devices (LLDP-MED) provides an extension to
the LLDP standard for network configuration and policy, device location, Power over Ethernet
management, and inventory management.
For information about configuring LLDP-MED, see "Configuring Link Layer Discovery Protocol (LLDP)
for Media Endpoint Devices."
Introduction29
Voice VLAN
The Voice VLAN feature enables switch ports to carry voice traffic with defined priority. The priority
level enables the separation of voice and data traffic coming onto the port.
For information about configuring Voice VLAN, see "Configuring Voice VLAN."
30Introduction
Loading...
+ 758 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.